802.11 User Fingerprinting MobiCom 2007 (Sept 9-14 2007 Montreal, Quebec, Canada)

Slides:



Advertisements
Similar presentations
Our Wireless World Our Wireless World
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Location-Aware Security Services for Wireless Sensor Networks using Network Coding IEEE INFOCOM 2007 최임성.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 1 CMU 2 Intel Research Seattle.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
1 (Un)Trustworthy Wireless: What your wireless traffic says about you… Jeff Pang with Ben Greenstein, Ramki Gummadi, Tadayoshi Kohno, David Wetherall (UW/Intel.
1 Tryst: Making Local Service Discovery Confidential Jeffrey Pang Ben Greenstein Srinivasan Seshan David Wetherall.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 1 CMU 2 Intel Research Seattle.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Security Awareness: Applying Practical Security in Your World
1/40 Quantifying and Preventing Privacy Threats in Wireless Link Layer Protocols Thesis Proposal Jeffrey Pang.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Link Setup Time (ms) Details : How do sender and receiver synchronize i ? Discovery/binding messages: infrequent and narrow interface  short term linkability.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
User Fingerprinting Jeff Pang, Ben Greenstein, Ramki Gummadi, Srini Seshan, and David Wetherall Most slides borrowed from Ben.
Wireless Sensor Network Security Anuj Nagar CS 590.
DAISY Data Analysis and Information SecuritY Lab
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Networking Components
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Snooping based privacy attacks based on transmission timing and wireless fingerprinting Master’s project presentation Vijay Srinivasan University of Virginia.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
CWNA Guide to Wireless LANs, Second Edition
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 Presenter: Nan Jiang Most Slides:
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
RADAR: an In-building RF-based user location and tracking system
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era Authors: Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen,
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
Lecture 24 Wireless Network Security
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Security of the Internet of Things: perspectives and challenges
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Introduction Wireless devices offering IP connectivity
MobiCom’13 Jie Xiong and Kyle Jamieson University College London
Subway Station Real-time Indoor Positioning System for Cell Phones
Remah Alshinina and Khaled Elleithy DISCRIMINATOR NETWORK
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
The pitfalls of address randomization in wireless networks
The pitfalls of address randomization in wireless networks
Presentation transcript:

User Fingerprinting MobiCom 2007 (Sept Montreal, Quebec, Canada)

Authors Jeffery Pang Ben Greenstein Ramakrishna Gummadi Srinivasan Seshan David Wetherall  Carnegie Mellon  Intel Research  U of Southern California  Carnegie Mellon  U of Washington

Problem Statement The best practices for securing networks, embodied in the i standard, provide user authentication, service authentication, data confidentiality, and data integrity. However, they do not provide anonymity, a property essential to prevent location tracking.

Objectives Demonstrate that existing user identification and tracking countermeasures are ineffective Highlight four previously unrecognized unique traffic identifiers (implicit identifiers) Present an automated procedure to uniquely identify wireless users

Problem In Detail The Implicit Identifier Problem ◦SSID Broadcast with identifiable names  “MIT” or “UniversityofWashington” ◦Traffic Patterns  Periodic IMAP or SMTP connections to an identifiable mail server  Unique repetitive packet/frame sizes ◦Design Flaws/Implementation Variances  Fingerprinting higher layers in the stack (nmap/p0f)  Timing Characteristics

WiGLE.net Implicit Identifiers map to physical locations Map SSID’s from captures to a 1 block radius

Related Work Location Privacy ◦RFID devices ◦GPS enabled devices Identity Hiding ◦Using pseudonyms to mask MAC addresses (Gruteser, Jiang, Stajano) Implicit Identifiers ◦Fingerprinting driver timings (Franklin, Kohno) ◦Clickprints (Padmanabhan and Yang)

The Test Bed The Adversary ◦Passive monitoring (weak adversary) ◦Using TCPDUMP only The Environment ◦Large and small wireless networks evaluated  2004 SIGCOMM Conference (4 days)  U.C. San Diego CS Building (1 day)  Apartment Building (19 days) ◦Encrypted (WEP/WPA) and Unencrypted Monitoring Scenario ◦Assume pseudonyms are randomly chosen every hour

Captured Traffic Statistics Training sigcomm – 1 day uscd – 4 hours apt – 5 days NOTE: Profiled users are those users who were present in both the training set and the validation data.

Evaluation Criteria Q1) Did this traffic sample come from user U? ◦Measuring the effectiveness of the classification model ◦User distinctiveness Q2) Was user U here today? ◦Can the presence of user U be detected during a particular 8 hour period?

Traffic Characteristics/Identifiers Network Destinations (netdests) ◦Set of IP pairs SSID Probes (ssids) ◦SSID discovery probes typical of Windows XP ◦Preferred networks list Broadcast Packet Sizes (bcast) ◦Set of pairs (or just size if encrypted) MAC Protocol Fields (fields) ◦More fragments, retry, power management, order, authentication algorithm offered, supported transmission rates

Identifiers [ssids] [netdests] [bcast] [frame]

Classification Model Naïve Bayes Classifier From Bayes’ Theorem: C = class (or U user) F i = implicit identifiers n = 4 in this case

Classification Model Feature Generation To compute probabilities implicit identifiers must be converted to real valued feature ◦[fields] – each field combination represents a different value ◦[ssids, bcast, netdests] – set of discrete elements  Weighted version of Jaccard similarity index to determine real-valued feature

Classifier Accuracy Accuracy measured by two components ◦True Positive Rate (TPR)  Fraction of validation samples that user U generates the are correctly classified ◦False Positive Rate (FPR)  Fraction of validation samples that user U does not generate that are incorrectly classified

Classifier Accuracy Metrics Mean True Positive Rate for a failure rate of 1/100 and 1/10 respectively Complementary cumulative distribution function (CCDF) on sigcomm users (c) FPR =.01 (d) FPR =.1 Mean achieved TPR and FPR for sigcomm users x=y line -> random guessing Max expected TPR

Tracking How accurately can the evaluation criteria be answered (Q1, Q2)? Constraints: ◦Public Network: [netdest, ssids, fields, bcast] ◦Home Network: [ssids, fields, bcast] ◦Enterprise Network: [ssids, bcast]

Tracking Testing the Classifier Classification accuracy using ‘Public, Home, Enterprise’ constraints Complementary cumulative distribution function (CCDF) FPR =.01 % of users that FPR errors that are less than.01 away from target FPR of 0.01 In all scenarios the classifier is able to identify unique users with 90%+ accuracy

Results 90% Accuracy Adversary Detected Users Active Users in a single hour Median active/hours needed to be detected Min/Max sampled needed The number of users that can be accurately identified is between 50% and 83%

Results 99% Accuracy The number of users that can be accurately identified is still significant

Conclusions Majority of users can be detected with 90% accuracy in public networks with less than 100 concurrent users ◦27% are detectable in all networks with less than 25 concurrent users. ◦Even in large networks 12-52% are detectable Some users can be detected with 99% accuracy ◦12-37% in all networks with 25 users or less.

Summary of Findings Ability to identify user’s is not uniform ◦Some users do not display any characteristics that distinguish themselves ◦Majority of users can be tracked with 90% accuracy even when unique names/addresses are removed Any one implicit identifier can be highly discriminating ◦An adversary may only 1-3 samples of user’s traffic to track them on average Research assumptions serve to place a lower bound on the findings ◦Advanced adversary may have a significantly higher percentage of accuracy Applying existing best practices will fail to protect the anonymity of a non-trivial fraction of users ◦Pseudonyms alone are not enough to provide location privacy

Next Steps Similar Research ◦Dijiang Huang, “Traffic analysis-based unlinkability measure for IEEE b-based communication systems”. 5th ACM workshop on Wireless security, ◦Y. Zhu, R. Bettati, ”Compromising Privacy in Wireless Network Using Cheap Sensors”. Texax A&M University Tech Report, 2005 Transmission Power Fluctuation ◦ J. Cai, H. You, B. Lu, U. Pooch, and L. Mi, “Whisper c a lightweight anonymous communication mechanism in wireless ad-hoc networks,” in Proc. of International Conference on Wireless Networks(ICWN 05), (Las Vegas, Nevada), june Pseudonyms ◦M. Gruteser and D. Grunwald, “Enhancing location privacy in wireless lan through disposable interfaceidentifiers: a quantitative analysis.,” in WMASH, pp. 46–55, RSS ◦A. M. Ladd, K. E. Bekris, A. Rudys, G. Marceau, L. E. Kavraki, and D. S. Wallach, “Robotics-basedlocation sensing using wireless Ethernet,” in Proceedings of the Eighth ACM International Conferenceon Mobile Computing and Networking (MOBICOM), (Atlanta, GA), Sept Angle of Arrival ◦D. Niculescu and B. Nath, “Vor base stations for indoor positioning,” in MobiCom ’04: Pro-ceedings of the 10th annual international conference on Mobile computing and networking, (NewYork, NY, USA), pp. 58–69, ACM Press, ◦D. Niculescu and B. R. Badrinath, “Ad hoc positioning system (aps) using aoa.,” in INFOCOM, Time of Arrival ◦R. J. I. Guvenc, C. T. Abdallah and O. Dedeoglu, “Enhancements to rss based indoor tracking systemsusing kalman filters,” in GSPx & International Signal Processing Conference, (Dallas, TX), 2003