Ostra: Leveraging trust to thwart unwanted commnunication Alan Mislove Ansley Post Reter Druschel Krishna P. Gummadi.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Networks Types. Spring 2002Computer Network Applications Data Transfer During the ’70s: Minicomputers became affordable; Need to communicate information;
Cryptographic Technologies
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Ostra: Leveraging trust to thwart unwanted communication A. Mislove, et al. Offense - Marcel Flores.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
A Security Analysis of the Network Time Protocol (NTP) Presentation by Tianen Liu.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Secure Electronic Transaction (SET)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Types of Electronic Infection
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
A Novel approach to Bind-over Sybil nodes in a swarm Zhang Bhanu Kaushik Deep Kamal Singh Xiang Cui.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
ACM 511 Introduction to Computer Networks. Computer Networks.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Improving Spam Detection Based on Structural Similarity By Luiz H. Gomes, Fernando D. O. Castro, Rodrigo B. Almeida, Luis M. A. Bettencourt, Virgílio A.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Network Security Introduction
I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Fall 2006CS 395: Computer Security1 Key Management.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Packet Leashes: Defense Against Wormhole Attacks
Information and Network Security
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Introduction to Cryptography
Presentation transcript:

Ostra: Leveraging trust to thwart unwanted commnunication Alan Mislove Ansley Post Reter Druschel Krishna P. Gummadi

Motivation Existing social network site allow any sender to reach potentially millions of users at near zero marginal cost. Unwanted communication wastes human attention. Need a way to thwart unwanted communication.

Existing approaches to thwarting unwanted communication Identify unwanted communications by automatically identifying content. Target the originator by identifying them and holding them accountable. Impose an upfront cost on senders for each communication.

Content – based filtering Classify communication automatically on the basis of its content. Subject to both false positives and false negatives. Unwanted communication is classified as wanted. Wanted communication is mis-classified as unwanted.

Originator – based filtering White listing. Requires users have unique identifiers and that content can be authenticated. Problem is that whitelisting can not deal with unwanted invitations.

Imposing a cost on the sender Deploying a decentralized system that charges a per-message fee may require a micropayment infrastructure, which some have claimed is impractical. The challenge-response systems need human attention to complete the challenge. Some automatically generated messages are wanted.

Content rating Help user to identify relevant content and avoid unwanted content. Also help system administrators to identify potentially inappropriate content. Only applicable to one-to-many communication, also can be manipulated when in a system with weak user identities.

Leveraging relationships Trust relationships are being used to eliminated the need for a trusted certificate authority. In Ostra, it is used to ensure a user with multiple identities cannot sent additional unwanted communication, unless she also has additional relationships.

Ostra strawman Three assumptions 1. Each user of the communication system has exactly one unique digital identity. 2. A trusted entity observes all user actions and associates them with the identity of the user performing the action 3. User classify communication they receive as wanted or unwanted.

System model With Ostra, communication consists of three phases. 1. Authorization.(Ostra check if a token could be issued to the sender) 2. Transmission. (Ostra attach the token at the sender side and check the receiving side) 3. Classification. (The recipient classifies the communication, provide feedback to Ostra)

Figure 1.

User Credit Ostra maintains a per-user balance range[L, U], with L<= 0 <= U. Sender’s L ++, Receiver’s U --, if adjustments cause credit balance to exceed range, Ostra refuse issue token. If not, token is issued. When receiver classifies the communication, unwanted cause one credit transfers from sender to receiver, otherwise adjustments are undone.

User Credit Properties 1. Limits the amount of unwanted communication a sender can produce. 2. Allows an arbitrary amount of wanted communication. Limits the number of tokens that can be issued for a specific recipient before that recipient classifies any of the associated communication.

Credit adjustment What if legitimate user gradually sends a lot of unwanted communication and his credit balance reach its bound? Add a decay rate d, with 0<= d <= 1. Outstanding credit(both positive or negative) decays at d percentage a day. The max rate for a user could legitimate produce unwanted communication is d*L + S

Credit adjustment Denial of service attack still possible. Introduce a special account C, like credit bank, only allow deposit credit, no withdraws are allowed.

Credit adjustment Add a Timeout T, if a communication has not been classified by the receiver after T, the credit bounds are automatically reset. Enable receivers to plausible deny receipt of communication.

Properties Ostra’s credit balance observes the following invariant. “At all time, the sum of all credit balance is 0” Based on i) users have an initial zero balance when joining the system, ii)all operations transfer credit among users, iii)credit decay affects positive and negative credit at the same rate.

Table 1

Multi – Party communication Moderator receives and classifies the communication on behalf of all members of the group. Only the moderator’s attention is wasted by unwanted communication. And the cost is the same as in two-party case. Example, Youtube, “flag as inappropriate” mechanism.

Ostra Design Strong user identities are not practical in many applications.(Require strong background check.) Need to refine the Ostra design to make it do not require strong user identities.

Trust networks There is a non-trivial cost for initiating and maintaining links in the network. The network must be connected.(Path between any two user identities exists.) Ostra assumes the system is a trust network and it has the complete view of the network.

Link Credit Use link credit instead of user credit. Each link with a link credit balance B, initial value 0, and range [L, U]. With L <= 0 <= U, and L<= B <= U.

Figure 2

Communicate among friends Figure 3

Communication among non friends Figure 4

Generalization of Ostra strawman Figure 5

Multiple identities Figure 6

Malicious attack Targeting user: Forgiving some of the debt on one of her links. Transfer credit to the overflow account C. Targeting links: Structure of social networks (which has dense core) is unlikely to be affected by this kind of attack on large scale.

Discussion Joint Ostra – new user should be introduced in by an existing Ostra user. Content classification – feed back from recipient is a necessary small cost to pay. Parameter setting – (L, U, and d) be chosen such that most legitimate users are not affected by the rate limit, while the amount of unwanted communication is still kept very low.

Discussion Compromised user account – easily be detected and even compromised, the communication still subjects to the same limits that apply to any individual user.

Evaluation Experimental trust network – YouTube(large, measured subset. 446,181 users and 1,728,938 symmetric links.) Experimental traffic workload – data containing 150 users and covering 13, 978 s.

Figure 7

Evaluation Setting parameters – two experiments with different assumptions about the avg. delay between arrival and classifying. Table 3

Evaluation Expected performance. Max rate d*L*D +S, D is the degree of user. L or d or proportional of malicious users in the network increase, we expect the overall rate of unwanted message to increase.

Evaluation Figure 8

Evaluation Figure 9

Evaluation Figure 10

Evaluation Figrue 11.

Decentralizing Ostra Each participating user runs an Ostra software agent on her own computer, the agent stores the user’s key material and maintains secure network connection to the Ostra agents of the user’s trusted friends. The two Ostra agents adjacent to a trust link each store a copy of the link’s balance and bounds.

Routing To find routes within the local neighborhood of a user, use an efficient bloom filter based mechanism. To find longer paths, use landmark routing to route to the destination’s neighborhood and then use bloom filters to reach the destination.

Decentralized credit update Figure 12