Click to edit Master title style Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs Scott Wolchok 1 Owen S. Hofmann 2 Nadia Heninger 3 Edward.

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Pastiche: Making Backup Cheap and Easy. Introduction Backup is cumbersome and expensive Backup is cumbersome and expensive ~$4/GB/Month (now $0.02/GB)
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Peer-to-Peer Systems Kulesh Shanmugasundaram Security Issues.
Comet: An Active Distributed Key-Value Store Roxana Geambasu Amit Levy Yoshi Kohno Arvind Krishnamurthy Hank Levy University of Washington.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Yoshi Kohno Amit Levy Hank Levy University of Washington.
S EMINAR A SELF DESTRUCTING DATA SYSTEM BASED ON ACTIVE STORAGE FRAMEWORK ONON P RESENTED BY S HANKAR G ADHVE G UIDED BY P ROF.P RAFUL P ARDHI.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small-Scale Peer-to-Peer Publish/Subscribe
Haifeng Yu National University of Singapore
Privacy Management for J. Alex Halderman Brent Waters Edward W. Felten Princeton University Department of Computer Science Portable Recording Devices J.
Applications over P2P Structured Overlays Antonino Virgillito.
Storage Management and Caching in PAST, a large-scale, persistent peer- to-peer storage utility Authors: Antony Rowstorn (Microsoft Research) Peter Druschel.
Improving Lookup Performance over a Widely-Deployed DHT Daniel Stutzbach Reza Rejaie The ION P2P Project University of.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Understanding Churn in Peer-to-Peer Networks Daniel Stutzbach – University of Oregon Reza Rejaie – University of Oregon Internet Measurement Conference.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Wide-area cooperative storage with CFS
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
Focus on Distributed Hash Tables Distributed hash tables (DHT) provide resource locating and routing in peer-to-peer networks –But, more than object locating.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Data Consistency in the Structured Peer-to-Peer Network Cheng-Ying Ou, Polly Huang Network and Systems Lab 台灣大學電機資訊學院電機所.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
Monitoring for network security and management Cyber Solutions Inc.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Ahmad Al-Shishtawy 1,2,Tareq Jamal Khan 1, and Vladimir Vlassov KTH Royal Institute of Technology, Stockholm, Sweden {ahmadas, tareqjk,
Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Cryptographic Security Secret Sharing, Vanishing Data.
High Throughput Computing on P2P Networks Carlos Pérez Miguel
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu, Tadayoshi Kohno, Amit Levy, et al. University of Washington USENIX Security.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy Henry M. Levy University of Washington.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu | Tadayoshi Kohno | Amit A. Levy | Henry M. Levy Presented by: Libert Tapia.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Paper by: Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy University of Washington Vanish: Increasing Data Privacy with Self-Destructing.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Sybil attacks as a mitigation strategy against the Storm botnet Authors:Carlton R. Davis, Jos´e M. Fernandez, Stephen Neville†, John McHugh Presenter:
Measurements and Mitigation of Peer-to-peer Botnets: A Case Study on Storm Worm Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling.
Click to edit Master title style Multi-Destination Routing and the Design of Peer-to-Peer Overlays Authors John Buford Panasonic Princeton Lab, USA. Alan.
DATABASE REPLICATION DISTRIBUTED DATABASE. O VERVIEW Replication : process of copying and maintaining database object, in multiple database that make.
A Sybil-Proof Distributed Hash Table Chris Lesniewski-LaasM. Frans Kaashoek MIT 28 April 2010 NSDI
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Challenge: Peers on Wheels – A Road to New Traffic Information Systems Jedrzej Rybicki, Björn Scheuermann, Wolfgang Kiess Christian Lochert, Pezhman Fallahi,
Large-Scale Monitoring of DHT Traffic Ghulam Memon – University of Oregon Reza Rejaie – University of Oregon Yang Guo – Corporate Research, Thomson Daniel.
NGMAST Mobile DHT Energy1 Optimizing Energy Consumption of Mobile Nodes in Heterogeneous Kademlia-based Distributed Hash Tables Imre Kelényi Budapest.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Distributed Network Traffic Feature Extraction for a Real-time IDS
Copyright notice © 2008 Raul Jimenez - -
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Pastiche: Making Backup Cheap and Easy
Discretized Streams: A Fault-Tolerant Model for Scalable Stream Processing Zaharia, et al (2012)
Vanish: Increasing Data Privacy with Self-Destructing Data
The Case for DDoS Resistant Membership Management in P2P Systems
Presentation transcript:

Click to edit Master title style Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs Scott Wolchok 1 Owen S. Hofmann 2 Nadia Heninger 3 Edward W. Felten 3 J. Alex Halderman 1 Christopher J. Rossbach 2 Brent Waters 2 Emmett Witchel 2 1 The University of Michigan 2 The University of Texas at Austin 3 Princeton University

Click to edit Master title style Road Map 1.What is Vanish? 2.Attacking Vanish 3.Costs and performance 4.Countermeasures 5.What went wrong?

Click to edit Master title style Why Self-Destructing Data? AliceBob “Transient” messages tend to persist Stored copies enable retroactive attacks Attacker subpoenas data months or years later

Click to edit Master title style DHT Vanish AliceBob Geambasu, Kohno, Levy, Levy — USENIX Security ’09   Mallory

Click to edit Master title style Vanish and Vuze Vanish uses the Vuze DHT (Distributed Hash Table) Over 1 million nodes, mostly BitTorrent Nodes delete values after 8 hours Vuze DHT

Click to edit Master title style Vanish and Vuze Vuze DHT Shares placed at random locations in the DHT Replicated to 20 “closest” nodes 

Click to edit Master title style Is Vanish Secure? Vanish 0.1 prototype released at publication Included user-friendly Firefox plugin Focused wide attention on its practical security

Click to edit Master title style Road Map 1.What is Vanish? 2.Attacking Vanish 3.Costs and performance 4.Countermeasures 5.What went wrong?

Click to edit Master title style DHT Crawling Threat Threat: attacker might continuously archive all data in the DHT Later, query archive to decrypt messages Don’t need specific targets when recording

Click to edit Master title style Crawling with a Sybil Attack

Click to edit Master title style A Practical Threat? Vanish authors anticipated this attack and estimated would need 87,000 Sybils at a cost of $860,000/year……… Can we do better?

Click to edit Master title style Making the Attack Practical Insight: have 8 hours to observe fragments Vuze replicates to 20 nearest nodes 1.Every 30 minutes 2.On join!

Click to edit Master title style

“Hopping” Strategy Sybils “hop” to new IDs every 3 minutes 160x resource amplification over 8 hours Practical attack needs only ~2000 concurrent Sybils with hopping

Click to edit Master title style Making the Attack Practical Insight: Vuze client is a notorious resource hog Only 50 instances fit in 2 GB of RAM! Can we more efficiently support 2000 Sybils?

Click to edit Master title style Optimized Sybil Client C, lightweight, event-based implementation Listen-only (no Vuze routing table!) Thousands of Sybils in one process

Click to edit Master title style Road Map 1.What is Vanish? 2.Attacking Vanish 3.Costs and performance 4.Countermeasures 5.What went wrong?

Click to edit Master title style Attack Costs? Vanish paper estimate (for 25% recovery at k=45, n=50): – 87,000 Sybils – $860,000/year What does attacking Vanish really cost?

Click to edit Master title style Experiments 1.Insert key shares into the DHT 2.Run attack from 10 Amazon EC2 instances 3.Measure: DHT coverage= % key shares recovered Key coverage = % messages decrypted Attack cost= EC2 charges (Sep. 2009)

Click to edit Master title style Experimental Results Cost for >99% Vanish key recovery? AttackConcurrent Sybils Key Shares Recovered Annual Attack Cost * Hopping50092%$23,500 Hopping + Optimized Client %$9,000

Click to edit Master title style DHT Coverage vs. Attack Size Hopping plus Optimized Client

Click to edit Master title style Key Recovery vs. Attack Size 70k Sybils 136k Sybils Hopping plus Optimized Client Key-sharing parameters (k/n)

Click to edit Master title style Annual Cost vs. Key Recovery $5000 $7000 $9000 Hopping plus Optimized Client Key-sharing parameters (k/n)

Click to edit Master title style Storage $1400/yr for all observed data $80/yr for potential key shares

Click to edit Master title style Road Map 1.What is Vanish? 2.Attacking Vanish 3.Costs and performance 4.Countermeasures 5.What went wrong?

Click to edit Master title style Increase Key Recovery Threshold? Required coverage increases in n and k/n Why not raise them? (99/100?) Reliability: some shares lost due to churn Performance: pushing shares is slow!

Click to edit Master title style Limit Replication? Attack exploits aggressive replication Less replication might make the attack harder, but how much? More in a few slides…

Click to edit Master title style Sybil Defenses from the Literature? Client puzzles Limit ports/IP, IPs/subnet, etc. Social networking

Click to edit Master title style Detecting Attackers Find and target IPs with too many clients Use node enumerator, Peruze Can detect attack IPs hours after the attack Detected the Vanish demo

Click to edit Master title style Road Map 1.What is Vanish? 2.Attacking Vanish 3.Costs and performance 4.Countermeasures 5.What went wrong?

Click to edit Master title style Recall Vanish Authors’ Analysis Cost estimates for 25% recovery at 45/50: – 87,000 Sybils – $860,000/year Extrapolated from 8000-node DHT Actual cost: -70,000 Sybils -$5000/year

Click to edit Master title style Cost Estimation Issues Vanish paper extrapolated from 8000-node DHT Assumed Sybils must run continuously Assumed attacker uses inefficient Vuze client

Click to edit Master title style Cost Not Linear in Recovery Key Recovery Fraction Key-sharing parameters (k/n) Coverage Fraction

Click to edit Master title style Response to Our Work Second report and prototype by Vanish team 1 New defenses – Use both Vuze DHT and OpenDHT – Disable replicate-on-join in Vuze – Use less aggressive “threshold replication” Will these defenses stop real attackers? 1 Geambasu, Falkner, Gardner, Kohno, Krishnamurthy, Levy. “Experiences building security applications on DHTs”. Technical report, UW-CSE

Click to edit Master title style Conclusion Showed attacks that defeat Vanish 0.1 in practice for $9000/year Vanish team has proposed new defenses Future work: are new defenses effective? Our take: building Vanish with DHTs seems risky.

Click to edit Master title style Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs Scott Wolchok 1 Owen S. Hofmann 2 Nadia Heninger 3 Edward W. Felten 3 J. Alex Halderman 1 Christopher J. Rossbach 2 Brent Waters 2 Emmett Witchel 2 1 The University of Michigan 2 The University of Texas at Austin 3 Princeton University

Click to edit Master title styleReferences J.R. Douceur. The Sybil attack. IPTPS R. Geambasu, J. Falkner, P. Gardner, T. Kohno, A. Krishnamurthy, H. Levy. Experiences building security applications on DHTs. Technical report, UW-CSE R. Geambasu, T. Kohno, A. Levy, H. Levy. Vanish: Increasing data privacy with self- destructing data. USENIX Security G. Memon, R. Rejaie, Y. Guo, D. Stutzbach. Large-scale monitoring of DHT traffic. IPTPS M. Steiner, T. En-Najjary, E. Biersack. A global view of Kad. IMC M. Steiner, W. Effelsberg, T. En-Najjary, E. Biersack. Load reduction in the KAD peer- to-peer system. DBISP2P D. Stutzbach and R. Rejaie. Improving lookup performance over a widely-deployed DHT. INFOCOM D. Stutzbach and R. Rejaie. Understanding churn in peer-to-peer networks. IMC 2006.

Click to edit Master title styleVanish Attack Model Need to recover k of n fragments p = Pr{recover key fragment} Pr{recover VDO} = Pr{recover k or more fragments} Binomial distribution Pr{recover VDO} =

Click to edit Master title styleCoverage Model m Sybils see c of N objects Balls-in-bins problem Expected fraction = 1 – e -cm/N = 1 – e -sm s = c/N is the (overlapping) fraction of the network observed by each Sybil

Click to edit Master title stylePrior Work Enumerating DHT nodes – Cruiser [Stutzbach 2006a,b] – Blizzard [Steiner 2007a] Measuring DHT traffic – Mistral [Steiner 2007b] – Montra [Memon 2009]

Click to edit Master title style Hopping plus Optimized Client Concurrent Sybils Hours# VDO Fragments Fragments Found (99.4%) (99.5%) (91.8%)