A New Replay Attack Against Anonymous Communication Networks Xinwen Fu June 30, 2015.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Bc. Oldřich Faldík Bc. Tomáš Pavlacký Bc. Ondřej Matulík Tor – anonymity online.
Tor: The Second-Generation Onion Router
One Cell is Enough to Break Tor’s Anonymity Xinwen Fu University of Massachusetts Lowell Team members Zhen Ling, Southeast University Junzhou Luo, Southeast.
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
Firewalls and Intrusion Detection Systems
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Xinwen Fu Anonymous Communication & Computer Forensics Computer & Network Forensics.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Network Security – Part 1 Spring 2005 V.T. Raja, Ph.D., Oregon State University.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Chapter 31 Network Security
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Secure connections.
National Chi Nan University Performance Evaluation of Transport Protocols in Smart Meter Networks Speaker: Chia-Wen Lu Advisor: Dr. Quincy Wu Date: 2012/07/23.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
--Harish Reddy Vemula Distributed Denial of Service.
1 Firewalls. 2 What is a firewall? Device that provides secure connectivity between networks (internal/external; varying levels of trust) Used to implement.
Zhen Ling Southeast University Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery In collaboration with Junzhou Luo, Southeast.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
SSL/TLS How to send your credit card number securely over the internet.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Information Security in Distributed Systems Distributed Systems1.
Chapter 1 – Introduction Part 4 1. Message Authentication Codes Allows for Alice and Bob to have data integrity, if they share a secret key. Given a message.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Dong Xuan: CSE885 on 11/07/07 The Ohio State University 1 Invisible Traceback in the Internet r Reference Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan and.
science/internet-intro
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Introduction to Networking. What is a Network? Discuss in groups.
Cyber Threat Dr. John P. Abraham Professor University of Texas Pan American.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Tor Bruce Maggs relying on materials from
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Systems Architecture Anonymous Key Agreement Dominik Oepen
Securing Information Systems
Chapter 4 Introduction to Network Layer
Securing Information Systems
Chapter 4 Introduction to Network Layer
Alex Guy packets (stars) tor routers users web servers (squares)
Chapter 15 – Part 2 Networks The Internal Operating System
Lecture 10: Network Security.
Bruce Maggs relying on materials from
Advanced Computer Networks
Bruce Maggs relying on materials from
Presentation transcript:

A New Replay Attack Against Anonymous Communication Networks Xinwen Fu June 30, 2015

ICC08 Xinwen Fu2/15 Outline  Introduction  Replay attack against anonymous communication systems - Tor  Evaluation  Summary

ICC08 Xinwen Fu3/15 Internet Security  Internet has brought convenience to our everyday lives  However, it has also become a breeding ground for a variety of crimes Malicious codes (worm and viruses) caused $13.2 billions in financial losses worldwide in 2001  We need to understand these attacks and design corresponding countermeasures  We present our research on a new attack against anonymous communication systems

ICC08 Xinwen Fu4/15 Traditional Spy Network  Indirectly send secret to Intelligence headquarter through a number of intermediate agents.  Protect the intelligence agent (i.e., source of secret) from being identified. Intelligence Center

ICC08 Xinwen Fu5/15 Anonymous Communication Network - Tor  Client: the user of the Tor network  Server: the target TCP applications such as web servers  Tor router: the special proxy relays the application data  Directory server: servers holding Tor router information

ICC08 Xinwen Fu6/15 Problem Definition of Attacks against Tor  Alice is sending messages to Bob through encrypted and anonymous channel, how can Evil confirm the communication relationship between Alice and Bob? Bob Alice Network

ICC08 Xinwen Fu7/15 Outline  Introduction  Replay attack against anonymous communication systems - Tor  Evaluation  Summary

ICC08 Xinwen Fu8/15 Basic Principle of the Replay Attack  A circuit is created by a sender and dedicated for a pair of users circuit A circuit B circuit C

ICC08 Xinwen Fu9/15 Replay Attack against Tor  A packet comes from Alice through circuit A, and goes to Bob after circuit C  Replayed packet X causes a (special) decryption error at the end of circuit C at Eve 2 An AES counter is synchronized through path and disturbed The duplicated packet disrupt the counter  Therefore, Circuits A and C are created by Alice  Claim: Alice is communication with Bob … … … Bob, Message M KBKB KAKA … KnKn Alice K1K1 Bob, Message M KBKB KAKA … KnKn Alice K1K1 BobEve 1 at EntryEve 2 at Exit circuit Acircuit Bcircuit C tttt

ICC08 Xinwen Fu10/15 Outline  Introduction  Replay attack against anonymous communication systems - Tor  Evaluation  Summary

ICC08 Xinwen Fu11/15 Experiment Setup

ICC08 Xinwen Fu12/15 Duplication Causing Path Teardown

ICC08 Xinwen Fu13/15 Outline  Introduction  Replay attack against anonymous communication systems - Tor  Evaluation  Summary

ICC08 Xinwen Fu14/15 Summary and Future Work  We identified a new replay attack against Tor and the attack can seriously degrade anonymity that Tor provides Need only one packet!!!  Our experiments validate the feasibility and effectiveness of the replay attack  Future work: develop countermeasure against the replay attack

ICC08 Xinwen Fu15/15 Thank you!

ICC08 Xinwen Fu16/15 Traditional Spy Network  Indirectly send secret to Intelligence headquarter through a number of intermediate agents.  Protect the intelligence agent (i.e., source of secret) from being identified.

ICC08 Xinwen Fu17/15 Replay Attack against Tor … … … Bob, Message M KBKB KAKA … KnKn Alice K1K1 Bob, Message M KBKB KAKA … KnKn Alice K1K1