Security and Privacy of Future Internet Architectures: Named-Data Networking Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content.

Slides:



Advertisements
Similar presentations
Panel: ICN Architecture Overview Cedric Westphal Huawei Innovations
Advertisements

Information-centric networking: Concepts for a future Internet David D. Clark, Karen Sollins MIT CFP November, 2012.
Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.
Information Hiding: Watermarking and Steganography
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen et. al NDSS 2014 Presenter: Yue Li Part of slides adapted from R.
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
ANDaNA: Onion Routing for NDN Steve DiBenedetto Colorado State University ANDaNA: Anonymous Named Data Networking Application NDSS ’12 Steven DiBenedetto,
Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED
Security+ Guide to Network Security Fundamentals
COS 420 Day 18. Agenda Assignment 4 Posted Chap Due April 6 Group project program requirements Submitted but Needs lots of work Individual Project.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Applied Cryptography for Network Security
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Distributed Systems & Networks i206 Fall 2010 John Chuang Some slides adapted from Coulouris, Dollimore and Kindberg.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Internet Indirection Infrastructure (i3) Ion Stoica Daniel Adkins Shelley Zhuang Scott Shenker Sonesh Surana (Published in SIGCOMM 2002) URL:
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Virtual Private Network
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Censorship Resistance: Parrots Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Private Information Retrieval Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Meta Architecture : A New Narrow Waist for Future Internet Hourglass
ComNets Tutorial: Future Internet with Information Centric Networks Asanga Udugama (1), Carmelita Goerg (1) and Andreas Timm-Giel (2) (1) Communications.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Usable Security Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last slide for.
Privacy in Content Oriented Networking: Threats and countermeasures Abdelberi Chaabane, Emiliano De Cristofaro, Mohamed Ali Kaafar, and Ersin Uzun.
Traffic Analysis: Network Flow Watermarking Amir Houmansadr CS660: Advanced Information Assurance Spring CS660 - Advanced Information Assurance.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
Multimedia & Mobile Communications Lab.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Privacy in ICN Nikos Fotiou and George Xylomenos Mobile Multimedia Laboratory Department of Informatics AUEB, Greece PURSUIT: Publish Subscribe Internet.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
Fall 2006CS 395: Computer Security1 Key Management.
K. Salah1 Security Protocols in the Internet IPSec.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
NETWORK SECURITY HERD: A SCALABLE, TRAFFIC ANALYSIS RESISTANT ANONYMITY NETWORK FOR VOIP SYSTEMS JINGTAO YAO JIAJUN LI ACM HORNORED CLASS.
CS590B/690B Detecting Network Interference (FALL 2016)
Computer Data Security & Privacy
Hardware accelerator to speed up packet processing in NDN router
Cloud Testing Shilpi Chugh.
Privacy Through Anonymous Connection and Browsing
0x1A Great Papers in Computer Security
Privacy in Content-Oriented Networking: Threats and Countermeasures
A Survey of the Research on Future internet architectures
Anonymous Communication
Presentation transcript:

Security and Privacy of Future Internet Architectures: Named-Data Networking Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last slide for acknowledgements!

The Internet of today Design dates back to the 70’s – Inspired by telephony systems – TCP/IP Main principle: end-to-end communication – Look up the endpoints of interest CS660 - Advanced Information Assurance - UMassAmherst 2

Routing in the Internet 3 User’s AS CNN’s AS Transit AS CS660 - Advanced Information Assurance - UMassAmherst

The Internet of today Design dates back to the 70’s – TCP/IP Main principle: end-to-end communication – Look up the endpoints of interest – Build applications on the top of TCP/IP CS660 - Advanced Information Assurance - UMassAmherst 4

5

But things have changed a lot since the 70’s! – Back then, communications were mostly end-to- end, so it was efficient – Security is not built into the TCP/IP Internet, but was added as an add-on CS660 - Advanced Information Assurance - UMassAmherst 6

Today New communication paradigms: – Content-intensive communications Content lookup Content caching – Mobility – Cloud computing The current Internet is not efficient anymore – Also, suffers from security challenges CS660 - Advanced Information Assurance - UMassAmherst 7

Not efficient! CS660 - Advanced Information Assurance - UMassAmherst 8 ISP

Goal: Look Like This CS660 - Advanced Information Assurance - UMassAmherst 9 ISP

Next-Generation Internet Architectures Design the Internet of the future! – More efficient More scalable Less overhead Less expensive … – More secure CS660 - Advanced Information Assurance - UMassAmherst 10

Next-Generation Internet Architectures Various proposals: – Content-centric networking (CCN) – NSF’s FIA program NDN MobilityFirst NEBULA XIA ChoiceNet – Many more CS660 - Advanced Information Assurance - UMassAmherst 11

Next-Generation Internet Architectures Main principles: – Built-in security – Content is the first-class citizen Cache content Name content Look for content – Mobility is pervasive – Cloud computing is ubiquitous CS660 - Advanced Information Assurance - UMassAmherst 12

Content-Centric Designs: Narrow Waist is the Content! CS660 - Advanced Information Assurance - UMassAmherst 13 TCP/IPCCN

Named-Data Networking (NDN) Name the content instead of the end-hosts – A content-centric architecture NSF FIA and FIA-NP programs Consumers: send interest packets Producers: return “pulled” content packets CS660 - Advanced Information Assurance - UMassAmherst 14

Routing in the TCP/IP Internet 15 User’s AS CNN’s AS Transit AS CS660 - Advanced Information Assurance - UMassAmherst

Routing in NDN 16 CS660 - Advanced Information Assurance - UMassAmherst Interest Content Interest

TCP/IPNDN Name end-hosts (e.g., IP addresses)Name content CommunicationContent distribution Mobility is difficultMobility-friendly Make processes secureMake content secure CS660 - Advanced Information Assurance - UMassAmherst 17

NDN Security All content objects are signed by the publishers – Authenticity – Integrity Content objects are encrypted – Confidentiality of content How about privacy? CS660 - Advanced Information Assurance - UMassAmherst 18

NDN: Privacy Benefits No “source address” in content interests – Not needed for routing Traffic monitoring less effective for non-global adversaries CS660 - Advanced Information Assurance - UMassAmherst 19 Interest Content Interest Does not see the interest

NDN: Privacy Challenges Name privacy – /CNN/Video/ /protest Content privacy – Public content Cache privacy – Detect hit/miss Signature privacy – Reveal publisher identity CS660 - Advanced Information Assurance - UMassAmherst 20

Privacy in NDN Privacy is not built-in – Need to protect privacy 1.Design PET tools 2.Integrate with the architecture CS660 - Advanced Information Assurance - UMassAmherst 21

ANDaNA An anonymous communication network for the NDN architecture – Tor’s counterpart Based on onion routing – Any router/host can be an anonymizing “relay” – Ephemeral circuits – Non-global adversary assumption CS660 - Advanced Information Assurance - UMassAmherst 22

ANDaNA design A circuit is composed of two routers (relays): – Entry router – Exit router Comparable to Tor’s three-hop circuits Why two routers: – NDN itself provides some notion of anonymity because of no source address in interests CS660 - Advanced Information Assurance - UMassAmherst 23

Onion Routing in NDN 24 /OR-1 /OR-2 I: /omh/blood-pressure/steve Nonce: Loc: /fitbit/key I: /omh/blood-pressure/steve Nonce: Loc: /fitbit/key I: /OR-2 I: /OR-1 I: /omh/blood-pressure/steve Nonce: Loc: /fitbit/key I: /OR-2 I: /omh/blood-pressure/steve Nonce: Loc: /fitbit/key D: /omh/blood-pressure/steve Loc: /fitbit/key { mmHg: 100 } D: /omh/blood-pressure/steve Loc: /fitbit/key { mmHg: 100 } D: /OR-2 D: /omh/blood-pressure/steve Loc: /fitbit/key { mmHg: 100 } D: /OR-2 D: /OR-1

Performance compared to Tor CS660 - Advanced Information Assurance - UMassAmherst 25

Performance compared to Tor CS660 - Advanced Information Assurance - UMassAmherst 26

Discussion So, is NDN (or other next-generation archs) more/less secure? More/less private? Is building PET tools easier or harder in NDN? Tradeoffs between security/privacy and performance? – Do we still benefit from caching? How is censorship circumvention different? Easier? Harder? How can we design next-generation Internet architectures with built-in privacy? Is it practical? What are the tradeoffs? CS660 - Advanced Information Assurance - UMassAmherst 27

Acknowledgement Some of the slides, content, or pictures are borrowed from the following resources, and some pictures are obtained through Google search without being referenced below: NDSS’12 presentation of the ANDaNA paper provided by the authors Steve DiBenedetto’s slides: ANDaNA: Onion Routing for NDN 28 CS660 - Advanced Information Assurance - UMassAmherst