Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.

Slides:



Advertisements
Similar presentations
Security Challenges for Future Internet Design Cybertrust PI Meeting Breakout.
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Network Basics: Circuit-siwtching vs. packet-switching
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Computer Network Architecture and Programming
1 Representing Identity CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 19, 2004.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
An Overlay Multicast Infrastructure for Live/Stored Video Streaming Visual Communication Laboratory Department of Computer Science National Tsing Hua University.
IP Routing: an Introduction. Quiz
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Securing a Wireless Network
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
CSE 4482, Fall 2009, D Chan Session 2 – Common Security Techniques.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
The Security Aspect of Social Engineering Justin Steele.
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
The Saigon CTT Semester 1 CHAPTER 11 Le Chi Trung.
Anonymity on the Internet Presented by Randy Unger.
Bypass a VPN, ACL, and VLAN ECE 4112 Alaric Craig and Pritesh Patel.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewalls Julie Petrusa S.A.M. Matiur Rahman Carlo Mormina.
Meng Yan. Introduction In fact, your online actions may be monitored by unauthorized parties logged and preserved for future access years later.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
William Stallings Data and Computer Communications
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Page 1 Network Addressing CS.457 Network Design And Management.
Presented by Rebecca Meinhold But How Does the Internet Work?
TCP/IP (Transmission Control Protocol / Internet Protocol)
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Stainov - DataComMET CS TC5353 THE NETWORK LAYER 5.2 ROUTING ALGORITHMS - adaptive Distance Vector Routing (Bellman-Ford, Ford-Fulkenson). It was used.
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
Term Projects Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.
Abstraction, Privacy, and the Internet. What is Abstraction? “The act of withdrawing or removing something” “The act or process of leaving out of consideration.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
NET 536 Network Security Firewalls and VPN
Network Security Analysis Name : Waleed Al-Rumaih ID :
Anonymous Communication
“Enterprise Network Design and Implementation for Airports” Master’s Thesis: By Ashraf Ali and advised by professor Nicholas Rosasco Introduction Practical.
Chapter 14: Representing Identity
0x1A Great Papers in Computer Security
IS4680 Security Auditing for Compliance
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Anonymous Communication
Alex Guy packets (stars) tor routers users web servers (squares)
Advanced Computer Networks
Computer Networks ARP and RARP
Anonymous Communication
Presentation transcript:

Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi

Anonymity and Population Houghton vs. New York –Murder case: Once in 10 years Once in every two hours Population of computer networks –Houghton in early ages –New York in nowadays Computer networks, everyone’s resource for everyday life –Critical resource for criminals too!

Anonymity and Identity Identity required vs. non-required –Many users don’t care! WWW? –Cookies! –(Unwanted,) unwarranted identification Openness of computer networks –Observe-ability at any networking devices

Digital Society Electronic Voting! (a best example?) –Identity required by authorities –Anonymity required by users –Deadline required by servers –Confirmation required by users –Secure delivery required by both users and authorities –Anything else?

Anonymity for Privacy? Who has communicated with whom? How long? How many bytes? From which location?

Easiest Approach Proxy –Single –Cascaded Fixed vs. Dynamic configuration Results? –User identity not known to server –Proxy, trustable? Who runs proxies?

Mix Networks Dedicated routers –Run by anonymity service providers –Use layered encryption technique –Users pick a path Results: –User identity known only to the first mix router Improvements: –Use same length of packets –Generate dummy traffic

Mixing Application: P2P? Transport: every TCP-able computer? IP: every router? MAC: every networking devices? Physical: Intelligent physical layer?