Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
A Survey Anonymity and Anonymous File-Sharing Tom Chothia (Joint work with Konstantinos Chatzikokolakis)
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Analysing the MUTE Anonymous File-Sharing System Using the Pi-calculus Tom Chothia CWI.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
Internet Networking Spring 2002 Tutorial 13 Web Caching Protocols ICP, CARP.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Tarzan: A Peer-to-Peer Anonymizing Network Layer Michael J. Freedman, NYU Robert Morris, MIT ACM CCS 2002
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
SSH Secure Login Connections over the Internet
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, : Adv. Network Security.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
1 CMPT 471 Networking II IGMP (IPv4) and MLD (IPv6) © Janice Regan,
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
IP Multicast COSC Addressing Class D address Ethernet broadcast address (all 1’s) IP multicast using –Link-layer (Ethernet) broadcast –Link-layer.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Presented by Rebecca Meinhold But How Does the Internet Work?
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
The Silk Road: An Online Marketplace
Mapping IP Addresses to Hardware Addresses Chapter 5.
Multicasting  A message can be unicast, multicast, or broadcast. Let us clarify these terms as they relate to the Internet.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
1 Anonymous Communications CSE 5473: Network Security Lecture due to Prof. Dong Xuan Some material from Prof. Joan Feigenbaum.
ID NO : 1070 S. VARALAKSHMI Sethu Institute Of Tech IV year -ECE department CEC Batch : AUG 2012.
Cryptography CSS 329 Lecture 13:SSL.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Anonymous Internet Protocols
Zueyong Zhu† and J. William Atwood‡
Anonymous Communication
Internet Networking recitation #12
0x1A Great Papers in Computer Security
Anonymous Communication
IP Multicast COSC /5/2019.
Computer Networks Protocols
Anonymous Communication
Presentation transcript:

Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems

Today’s Lecture Practical course issues. Theoretical anonymity. –Dinning Cryptographers Protocol –Definitions of Anonymity –The Crowds Protocol BREAK Practical anonymous systems –Onion Routing and the Tor System –Mix Networks –Anonymous File-sharing Systems: MUTE –Anonymous Publishing: Freenet

Crowds A crowd is a group of n nodes The initiator selects randomly a node (called forwarder) and forwards the request to it A forwarder: –With prob. 1-p f selects randomly a new node and forwards the request to him –With prob. p f sends the request to the server server

Crowds The sender is beyond suspicion to the server. Some of the nodes could be corrupted. The initiator could forward the message to a corrupted node. The sender has probable innocence to other nodes.

Crowds Problem: many people won’t forward traffic for others. A practical system has to make forwarding traffic for others optional or controllable. server

Onion Routing Each node makes its key public The initiator selects the whole route and encrypts the message with all keys in reverse order Each node unwraps a layer and forwards the message to the next one {2,{3,{server,m} k3 } k2 } k m {3,{server,m} k3 } k2 {server,m} k3 server

Onion Routing Each node only learns the next one in the path End-users can run their own node –Better anonymity or use an existing one –More efficient –User's identity is revealed to the node

Tor Tor implement this protocol. Several hundred volunteer nodes. Firefox plug-in. Managed by the US navy.

Problems with Tor You reveal you IP to the first node and the last node see who you are talking to. If an attacker controls the first and the last node they may be able to match the packets using traffic analysis. No anonymity from an attacker that monitors the whole network. Some protocol broadcast their IP address

MIXes MIXes are proxies that forward messages between them A user contacts a MIX to send a message The MIX waits until it has received a number of messages, then forwards them in different order

MIXes It is difficult to trace the route of each message. May provide beyond suspicion S-R unlinkability even to a global attacker. Messages have to be delayed (can be solved with dummy traffic). More complicated when sending series of packets

Mutli-casting Broadcast the message to the whole network. Beyond suspicion for the receiver. No anonymity for the sender. Multicasting is a good technique for broadcasting messages.... but very inefficient to send just one message.

Spoofed UDP The from IP address is not used by routers, only by higher-level protocols such as TCP. UDP does not have to use this address. A random address can be used instead to provide sender anonymity. Method prohibited by many ISPs.

Anonymous File-Sharing system 800,000 downloads Informal description Source code Appeal for donations

Peer-to-Peer File-Sharing In newer networks peers record the IP address of other peers. A searcher sends a request to all of it’s “neighbours”. This is forwarded to all of there neighbours, up to a fixed hops. A

Peer-to-Peer File-Sharing The search request includes A’s IP address. Any peer with the requested file contacts A directly. Peer “A” may then request the file. A

Peer-to-Peer File-Sharing No anonymity from peers inside the network: The search message gives the searcher’s IP address and name of the files they are looking for. By requesting a file, you can find out the IP address of all peers that are offering the file. A

MUTE MUTE removes the IP address from the file exchange. Peers only know the IP address of their direct neighbours. Peers choose random “pseudo ID”. Files are not sent directly between peers. Instead files are sent via a number of peers. MUTE uses a version of the “Ants” ad-hoc routing protocol.

Anonymity Provided by MUTE MUTE makes it hard to link the IP address of a peer with its pseudo ID. Peers only know the ID address's of their direct neighbours, but not their pseudo ID. The network should provide enough cover to let a neighbour deny using a particular ID. If an attacker can completely surround a peer it looses anonymity.

MUTE: Search The search takes place as before, but this time the message uses its pseudo ID as the “from ID”. Each peer builds a routing table by records the ID and the connection. A probabilistic time-to-live counter limits the search. A A A A A A A A A

MUTE: Reply If B wants to reply it sends a message to A’s pseudo ID. This message is routed using the ad- hoc routing table. The route to B is also recorded A A A A A A A A A B B B B

Un-forgeable Pseudo IDs MUTE using a hash of using authentication keys as the peers pseudo IDs. A peer generates a RSA signature key “kS” and an authentication key “kA”. The message header now has the form: ( to ID, #(kA), message ID-time_stamp, FLAGS:(S kS (messageID-time_stamp), kA) )

Freenet and Free Haven There are a number of “anonymous publishing system”. For example Freenet and the MIX based Free Haven. These systems make the original author of a file anonymous, not the responder. Nodes will often cache files.Therefore you can “trick” a node into storing and “offering” a file.

Summary of methods

Some Kinds of Attack Timing attacks System Membership Time-to-Live Attacks (Mute, Mantis) Multiple Attackers (Mute) Statistical Attacks (MIXes) Forced Repeat (Crowds) Nodes Joining and Leaving Denial of Service (Mute)

Today’s Lecture Practical course issues. Theoretical anonymity. –Dinning Cryptographers Protocol –Definitions of Anonymity –The Crowds Protocol BREAK Practical anonymous systems –Onion Routing and the Tor System –Mix Networks –Anonymous File-sharing Systems: MUTE –Anonymous Publishing: Freenet