SkypeMorph: Protocol Obfuscation for Tor Bridges

Slides:



Advertisements
Similar presentations
I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention Amir Houmansadr (The University of Texas at Austin) Thomas.
Advertisements

Technology Made Easy!! Telnet and Voice over internet Protocol(VOIP) By: Nicolette Johnson Peta-Lee Richards.
SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
More about Skype. Overview Any node with a public IP address having sufficient CPU, memory and network bandwidth is a candidate to become a super node.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
DISCLAIMER:  If you think you know it all, don’t shout out the answers! Go here:  game.shtml
VOIP ENGR 475 – Telecommunications Harding University November 16, 2006 Jonathan White.
Censorship Resistance: Parrots Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
© British Telecommunications plc Network Filtering.
The Parrot is Dead: Observing Unobservable Network Communications
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Voice over IP in the Enterprise. What is VOIP? The use of data networks to carry voice without a loss of sound quality The use of data networks to carry.
Client/Server Model.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Computer Networks with Internet Technology William Stallings
Networking Components
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
SOS: Secure Overlay Services A.Keromytis, V. Misra, and D. Rubenstein Presented by Tsirbas Rafail.
An analysis of Skype protocol Presented by: Abdul Haleem.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U.
The Silk Road: An Online Marketplace
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Authors: Henry Post Darian Gurrola Davvid Caballero.
What is an IP address? Each and every computer that you use that connects to the internet or a network uses a specific range of numbers separated by periods.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Section #7: Getting Data from Point A to Point B.
Internet Protocol Storage Area Networks (IP SAN)
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Networking Components Assignment 3 Corbin Watkins.
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
Anonymous Internet Browsing by Collin Donaldson. Outline  Overview  Definitions and Explanations  Part 1: How it all works  Overview of Network Communication.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
NETWORK SECURITY HERD: A SCALABLE, TRAFFIC ANALYSIS RESISTANT ANONYMITY NETWORK FOR VOIP SYSTEMS JINGTAO YAO JIAJUN LI ACM HORNORED CLASS.
The Great Firewall of China What is it and how does it work?
Introduction to Information Security
The FUTURE OF the internet
Presented by Nelson Mandela Date 7th February 2017
CS590B/690B Detecting Network Interference (FALL 2016)
Section 4 – Computer Networks
Prince Mohammad Bin Fahd University
CS590B/690B Detecting Network Interference (Fall 2016)
Roger Dingledine Jacob Appelbaum
Firewall Exercise.
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Unit Network Topologies, protocols and layers Lesson 2
File Transfer Protocol
Privacy Through Anonymous Connection and Browsing
PPPoE Internet Point to Point Protocol over Ethernet
Ian Ramsey C of E School GCSE ICT Smart working Any time, anywhere.
File Transfer Issues with TCP Acceleration with FileCatalyst
Switch controller: Routing
ДАРБИ КАРИЕРНа ориентация
(DNS – Domain Name System)
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

SkypeMorph: Protocol Obfuscation for Tor Bridges Hooman Mohajeri Moghaddam Baiyu Li  Mohammad Derakhshani. Ian Goldberg Presented by Ganbi

Outline Overview Problem Solution Questions

Anonymity Is it Important? Answer: Tor People’s lives depend on it Authoritative Government vs. Activist Groups Syria, Egypt, China Answer: Tor

Tor Overview

Tor Overview

Tor Overview

Tor Problem The public list of Tor relay nodes can give away all the IP addresses. To fix, developers added “bridge”

Tor Problem

Tor Problem Bridge

4 Ways to get Bridge IP https://Bridges.torproject.org will tell you few based on your IP address and location Mail bridges@torproject.org Via social network You can set up your own and tell your target users directly

Problem Slowly China was able to block most Bridges by probing DPI (deep packet inspection) is still possible

Solution/Paper Pluggable transports SkypeMorph Disguise the Tor packets to look like Skype traffic by using already existing Skype VoIP protocol and user authentication system.

Solution Bridge

Advantages Anyone can use, it’s free! Can transfer reasonable size of data = no bottleneck Encryption already built in In order to stop Tor, they also have to stop legitimate Skype calls, which is highly unlikely Another big advantage: Harder to block bridges even after they are found

Two Methods

Two Methods

Works Cited Moghaddam, Li, Derakhshani, and Goldberg "SkypeMorph: Protocol Obfuscation for Tor Bridges" (n.d.): n. pag. Print. https://www.torproject.org/about/overview.html.en