1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
IP Forwarding Relates to Lab 3.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Network Layer and Transport Layer.
6/15/2015 3:39 PM Lecture 6: Identity and Data Mining James Hook (Some material from Bishop, 2004) CS 591: Introduction to Computer Security.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #13-1 Chapter 14: Identity What is identity Multiple names for one thing Different.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
1 Representing Identity CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 19, 2004.
ITIS 6167/8167: Network and Information Security Weichao Wang.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #15-1 Chapter 14: Identity What is identity Multiple names for one thing Different.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
1 Internet Protocol: Forwarding IP Datagrams Chapter 7.
CSCI 5234 Web Security1 Privacy & Anonymity in the WWW Ch. 12, Oppliger.
Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University.
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
10/8/2015CST Computer Networks1 IP Routing CST 415.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
CSC 382: Computer SecuritySlide #1 CSC 382: Computer Security Identity.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Delivery, Forwarding, and Routing of IP Packets
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
Internet Protocol: Routing IP Datagrams Chapter 8.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Slide #15-1 Chapter 14: Identity What is identity Multiple names for one thing Different contexts, environments Pseudonymity and anonymity.
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
Onion Routing R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Chapter 13. Identity.
Chapter 5 Network and Transport Layers
Chap 13. Representing Identity
Chapter 11 User Datagram Protocol
Computer Security: Art and Science
Objective: ARP.
Forwarding and Routing IP Packets
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
Net 323: NETWORK Protocols
Chapter 14: Representing Identity
Chapter 14 User Datagram Protocol (UDP)
IP Forwarding Relates to Lab 3.
Chapter 15. Internet Protocol
Computer Security: Art and Science
Networking Essentials For Firewall-1 Administrators
Networking and Network Protocols (Part2)
Computer Networks ARP and RARP
Outline The spoofing problem Approaches to handle spoofing
Lecture 4a Mobile IP 1.
Computer Networks Protocols
Presentation transcript:

1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity

2 Identity Principal: a unique entity Identity: specifies a principal Used for: accountability, access control, and resource allocation Authentication: binding of a principal to a representation of identity internal to the system –All access, resource allocation decisions assume binding is correct

3 Identity on the Web Host identity –Static identifiers: do not change over time –Dynamic identifiers: changes as a result of an event or the passing of time Anonymity –Anonymous –Anonymity: good or bad?

4 Host Identity Bound up to networking –Not connected: pick any name –Connected: one or more names depending on interfaces, network structure, context

5 Example Layered network –MAC layer Ethernet address: 00:05:02:6B:A8:21 AppleTalk address: network 51, node 235 –Network layer IP address: –Transport layer Host name: cherry.orchard.chekhov.ru

6 Danger! Attacker spoofs identity of another host –Protocols at, above the identity being spoofed will fail –They rely on spoofed, and hence faulty, information Example: spoof IP address, mapping between host names and IP addresses

7 Domain Name Server Maps transport identifiers (host names) to network identifiers (host addresses) –Forward records: host names  IP addresses –Reverse records: IP addresses  host names Weak authentication –Not cryptographically based –Various techniques used, such as reverse domain name lookup

8 DNS Security Issues Trust is that name/IP address binding is correct Goal of attacker: associate incorrectly an IP address with a host name –Assume attacker controls name server, or can intercept queries and send responses

9 Attacks Change records on server Add extra record to response, giving incorrect name/IP address association –Called “cache poisoning” Making the host ask wrong server from very beginning

10 Anonymity on the Web Both sender anonymity and receiver anonymity Recipients can determine origin of incoming packet –Sometimes not desirable Anonymizer: a site that hides origins of connections –Usually a proxy server User connects to anonymizer, tells it the destination Anonymizer makes connection, sends traffic in both directions –Destination host sees only anonymizer

11 Example: anon.penet.fi Offered anonymous service –Sender sends letter to it, naming another destination –Anonymizer strips headers, forwards message Assigns an ID (say, 1234) to sender, records real sender and ID in database Letter delivered as if from –Recipient replies to that address Anonymizer strips headers, forwards message as indicated by database entry

12 Problem Anonymizer knows who sender, recipient really are Called pseudo-anonymous r er or pseudonymous r er –Keeps mappings of anonymous identities and associated identities If you can get the mappings, you can figure out who sent what

13 More anon.penet.fi Material claimed to be copyrighted sent through site Finnish court directed owner to reveal mapping so plaintiffs could determine sender Owner appealed, subsequently shut down site

14 Cypherpunk R er R er that deletes header of incoming message, forwards body to destination Cannot reply to the sender No record kept of association between sender address, r er’s user name –Prevents tracing, as happened with anon.penet.fi Usually used in a chain, to obfuscate trail –For privacy, body of message may be enciphered

15 Cypherpunk R er Message Encipher message Add destination header Add header for r er n … Add header for r er 1 Hi, Alice, It’s SQUEAMISH OSSIFRIGE Bob send to Alice send to r er 2 send to r er 1

16 Weaknesses Attacker monitoring entire network –Observes in, out flows of r ers –Goal is to associate incoming, outgoing messages If messages are cleartext, trivial –So assume all messages enciphered So use traffic analysis! –Used to determine information based simply on movement of messages (traffic) around the network

17 Attacks If r er forwards message before next message arrives, attacker can match them up –Hold messages for some period of time, greater than the message interarrival time –Randomize order of sending messages, waiting until at least n messages are ready to be forwarded Note: attacker can force this by sending n–1 messages into queue

18 Attacks As messages forwarded, headers stripped so message size decreases –Pad message with garbage at each step, instructing next r er to discard it Replay message, watch for spikes in outgoing traffic –R er can’t forward same message more than once

19 Mixmaster R er Cypherpunk r er that handles only enciphered mail and pads (or fragments) messages to fixed size before sending them –Designed to hinder attacks on Cypherpunk r ers Messages uniquely numbered Fragments reassembled only at last r er for sending to recipient

20 Cypherpunk R er Message recipent’s address any mail headers to add message padding if needed enciphered with DES key #2 final hop address packet ID: 168 message ID: 7839 DES key: 2 random garbage enciphered with DES key #1 r er #2 address packet ID: 135 DES key: 1 enciphered with RSA for r er #2 enciphered with RSA for r er #1 recipent’s address any mail headers to add message padding if needed enciphered with DES key #2 final hop address packet ID: 168 message ID: 7839 DES key: 2 random garbage enciphered with RSA for r er #2

21 One step forward: Onion routing –Every intermediate node knows the previous hop and the next hop –But it does not know whether the previous hop is the original sender, or the next hop is the final destination

22 Anonymity Itself Some purposes for anonymity Are these benefits or drawbacks? –Depends on society, and who is involved –Protect privacy –Hinder the detection of crimes

23 Key Points Identity specifies a principal (unique entity) –Same principal may have many different identities –These may vary with view of principal Different names at each network layer, for example –Anonymity possible; may or may not be desirable Power to remain anonymous includes responsibility to use that power wisely