Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme Jun Xu, Jinliang Fan, Mostafa Ammar,

Slides:



Advertisements
Similar presentations
Private Circuits Protecting Circuits Against Side-Channel Attacks Yuval Ishai Technion & UCLA Based on joint works with Manoj Prabhakaran, Amit Sahai,
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
Assigned “term” Prefix or Suffix ?. definition Origin or prefix/suffix Definition.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Exploring timing based side channel attacks against i CCMP Suman Jana, Sneha K. Kasera University of Utah Introduction
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
On The Cryptographic Applications of Random Functions Oded Goldreich Shafi Goldwasser Silvio Micali Advances in Cryptology-CRYPTO ‘ 84 報告人 : 陳昱升.
Application-Layer Anycasting: A Server Selection Architecture and Use in a Replicated Web Service IEEE/ACM Transactions on Networking Vol.8, No. 4, August.
National Center for Supercomputing Applications Adam Slagell, Jun Wang and William Yurcik, National Center for Supercomputing Applications (NCSA) University.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Lecture 23 Symmetric Encryption
Crossroads: A Practical Data Sketching Solution for Mining Intersection of Streams Jun Xu, Zhenglin Yu (Georgia Tech) Jia Wang, Zihui Ge, He Yan (AT&T.
1 Cryptographically Strong Pseudorandom Functions and Their Applications 陳昱升 碩士學位論文 中興大學 資訊科學系 2006 年 6 月.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Computer Security CS 426 Lecture 3
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
TOWARDS IDENTITY ANONYMIZATION ON GRAPHS. INTRODUCTION.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
HASH Functions.
Cryptography and Network Security (CS435)
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
A Privacy-Preserving Interdomain Audit Framework Adam J. Lee Parisa Tabriz Nikita Borisov University of Illinois, Urbana-Champaign WPES 2006.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Chapter 18 IP: Internet Protocol Addresses
Information Security Lab. Dept. of Computer Engineering 182/203 PART I Symmetric Ciphers CHAPTER 7 Confidentiality Using Symmetric Encryption 7.1 Placement.
WEP Protocol Weaknesses and Vulnerabilities
ECO-DNS: Expected Consistency Optimization for DNS Chen Stephanos Matsumoto Adrian Perrig © 2013 Stephanos Matsumoto1.
Hash and MAC Functions CS427 – Computer Security
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Attacks on PRNGs - By Nupura Neurgaonkar CS-265 (Prof. Mark Stamp)
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge NDSS 2015, Shouling Ji, Georgia Institute of Technology.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
The Devil and Packet Trace Anonymization Authors: Ruoming Pang, Mark Allman, Vern Paxson and Jason Lee Published: ACM SIGCOMM Computer Communication Review,
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 19 PHILLIPA GILL - STONY BROOK U.
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Peer to Peer Network Design Discovery and Routing algorithms
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Evaluating and Optimizing IP Lookup on Many Core Processors Author: Peng He, Hongtao Guan, Gaogang Xie and Kav´e Salamatian Publisher: International Conference.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
1 A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher Souradyuti Paul and Bart Preneel K.U. Leuven, ESAT/COSIC.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Cryptography CSS 329 Lecture 13:SSL.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Forward Secure Signatures on Smart Cards A. Hülsing, J. Buchmann, C. Busold | TU Darmstadt | A. Hülsing | 1.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
RSA Laboratories’ PKCS Series - a Tutorial
Assignment 6: Huffman Code Generation
Internet Indirection Infrastructure (i3)
Advanced Computer Networks
ECE 544 Protocol Design Project 2016
Cryptography Lecture 19.
Balancing Risk and Utility in Flow Trace Anonymization
Path Oram An Extremely Simple Oblivious RAM Protocol
Presentation transcript:

Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme Jun Xu, Jinliang Fan, Mostafa Ammar, Sue Moon College of Computing Sprint ATL Georgia Tech modified & presented by Zihui Ge

1 Overview  Motivation  IP address anonymization prefix-preserving  Prefix-preserving anonymization  canonical form  TCPdpriv  cryptography-based scheme  Attacks  models, analysis, evaluation

1 Motivation  Traces collected, to share or not to share?  client personal privacy?  commercial confidentiality?  IP address anonymization  →  one to one mapping, consistent  Prefix relationships among IP addresses?  important: routing performance, clustering of end-systems  Prefix-preserving anonymization  →  →  preserve prefix correlation among addresses

1 IP Address Anonymization  Basic anonymization a: original 4-byte IP address a =a 1 a 2 … a 32 a’: anonymized IP addressa’=a’ 1 a’ 2 …a’ 32 F: 1-to-1 mapping functiona’=F(a)  Prefix preserving anonymization if a, b share k-bit prefix a 1 =b 1,a 2 =b 2, …, a k =b k, a k+1 =b k+1 then a’=F(a), b’=F(b) share k-bit prefix a’ 1 =b’ 1,a’ 2 =b’ 2, …, a’ k =b’ k, a’ k+1 =b’ k+1

1 Canonical Form  Canonical construction of F using a series of f i a’ i = a i  f i-1 (a 1, a 2, …, a i-1 ) f 0 is a constant  F is a prefix-preserving anonymization function  A prefix-preserving anonymization function necessarily takes this form  Different schemes use different f i  Visualized as a tree

1 Visualization : Address Space

1 Visualization: Original Address Tree

1 Visualization: Anonymization Function FlipLeaf Node f 0 ()= f 1 (0)=1 f 1 (1)=0 f 2 (0,0)=0

Visualization: Anonymized Address Tree

1 TCPdpriv a 1 a 2 …a k a k+1 a K+2 …a n rand(a 1 a 2 …a k a k+1 …a n ) a 1 a 2 …a k a k+1 b k+2 …b n a’ 1 a’ 2 …a’ k a’ k+1 …a’ n a’ 1 a’ 2 …a’ k a’ k+1 a’ 1 a’ 2 …a’ k a’ k+1 b’ k+2 …b’ n  Sequentially scan IP address  look up prefix in “history” table  randomly choose suffix  concatenate prefix,suffix; update “history” table rand(b k+2 …b n )

1 TCPdpriv  Sequentially scan IP address  look up prefix in “history” table  randomly choose suffix  concatenate prefix,suffix; update “history” table  Mapping is trace-dependent  Need to maintain a table to track previous mappings  table size grow over time  look up cost increase over time  Unable to process in parallel

1 New Crytography-Based Algorithm  deterministic f i function  trace-independent  What PRF to use?  Practical bock ciphers, e.g., AES, can be modeled as PRP L: least significant bit R: pseudo-random function P: secret padding K: secret key f i (a 1, a 2, …, a i-1 ) := L(R(P(a 1 a 2 …a i-1 ), K))

1 Attacks on Anonymization Schemes  Cryptographic attacks  scheme specific  vulnerability comes from the specific construction of f i  TCPdpriv: not susceptible  our scheme: provable secure  Semantic attacks  common to all schemes  vulnerability comes from the canonical construction of F  effectiveness should be measured

1 Evaluation of Semantic Attacks  Metrics to measure effect of attacks  Virtual (but theoretically interesting) attacks  good measure of the resistance of a specific trace to semantic attacks in general  good relative reference points for measuring the effectiveness of practical attacks.  Practical attacks

1 Metrics to Measure Effect of Attacks  Measure of attack severity:  U: # of unknown uncompressed bits  C: # of unknown compressed bits  K i : # of addresses with exactly i known most significant bit

1 If an address is compromised … C=9, U=18, K 1 =4, K 2 =2, K 3 =2, K 4 =1000?0010 1??? 000? 01?? 1???

1 Evaluation on Real Traces  Measure the resistance of a specific trace to semantic attacks in general  Effect of compromising random address  Effect of compromising greedily-generated address

1 Effect of Compromising Random Addresses

1 Practical Attacks  Frequency Analysis  DNS Server Address Tracing  Others

1 Conclusions  Canonical form of constructing prefix- preserving anonymization function  New cryptography-based scheme  Framework of measuring the resistance of traces and the effectiveness of attacks  Implementation