Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.

Slides:



Advertisements
Similar presentations
On the Privacy of Private Browsing Kiavash Satvat, Matt Forshaw, Feng Hao, Ehsan Toreini Newcastle University DPM’13.
Advertisements

Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Welcome to Florida International University Online J.O.B.S. Link Applicant Tutorial.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
UTEPComputer Science Dept.1 University of Texas at El Paso Privacy in Statistical Databases Dr. Luc Longpré Computer Science Department Spring 2006.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
1 (Un)Trustworthy Wireless: What your wireless traffic says about you… Jeff Pang with Ben Greenstein, Ramki Gummadi, Tadayoshi Kohno, David Wetherall (UW/Intel.
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis Presented by Yang Gao 11/2/2011 Charles V. Wright MIT Lincoln Laboratory Scott.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
School of Computer Science and Information Systems
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
You’re using Top Hat this term! Top Hat is a classroom response system that allows users to participate in class polls, quizzes, discussions, and more.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Intranet, Extranet, Firewall. Intranet and Extranet.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Session 7 LBSC 690 Information Technology Security.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
ITGS Databases.
The Intranet.
How the Web Works Building a Website – Lesson 1. How People Access the Web Browsers People access websites using software called a web browser. To view.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Topic 5: Basic Security.
A library is primarily set up to acquire, organized, store and make accessible to the users, within the quickest possible time all forms of information.
A Guide to Your Volunteer Connection Account. Access Volunteer Connection Visit or navigate to Volunteer Connection.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Computer Security By Duncan Hall.
Introduction With the development of the Internet a phenomenon known as 'electronic commerce' or 'ecommerce' for short, has been growing. Ecommerce has.
#16 Application Measurement Presentation by Bobin John.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
K. Salah1 Security Protocols in the Internet IPSec.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Exposing Private Information by Timing Web Applications Stephen Kleinheider.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
Facebook privacy policy
COMPUTER NETWORKS CS610 Lecture-21 Hammad Khalid Khan.
NET 536 Network Security Firewalls and VPN
Internet Identity, Safety, & Security
CONNECTING TO THE INTERNET
Internet and Intranet.
Internet and Intranet.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
CPSC 641: WAN Measurement Carey Williamson
Internet and Intranet.
Carey Williamson Department of Computer Science University of Calgary
Internet and Intranet.
Internet Research Group at Clemson University
Lesson 2: Gathering and Organizing Information Using ICT KEY QUESTION: HOW DO YOU GATHER AND ORGANIZE INFORMATION USING THE COMPUTER AND INTERNET?
Exposing Private Information by Timing Web Applications
Presentation transcript:

Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst

A Privacy Framework Your identity is composed of private details. –Some secured: password –Some protected: database inference (ppdm), RFID?? –Some mundane: name, phone, purchases, movements, contacts Your actions leave signatures –Distinguishing, repeated statistical features, not necessarily unique. A collection of details may –allow access to a valued resource (identity theft): name, address, account number is access to a credit card –Or allow identity profiling. Some details seem innocuous, but may be useful to others when linked together: address and recent book purchase is good for spammers Name and recent web sites visited is good for big brother.

Signatures One type of signature is a user signature –Characteristics that result from your behavior and are persistent over time. –The web sites you visit. –The content of the sites you visit. –The path or roads you take to work each day.

Visiting the Same Web site over time

A simple example: User Interest Signatures We took a 9-month collection of web browser traffic of 16 volunteers at UMass We represented each user as a statistical distribution of words, ignoring phrases, order, and semantics (a language model). We looked for words that differentiate users from the community model (using Kullback-Leibler divergence). We split the trace in half, and see if web pages retrieved in the second half can be matched to users from the first.

A simple experiment 625 to 12,548 retrievals per user in second half (avg 3,400) Graph shows the accuracy of the top 1000 or 100 pages for each user Some users are predictable, some are not (likely it is based on how much news they read.) Some difficulties but a promising approach…

Network Traffic Signatures Signatures of User Interest can be protected by an encrypted connection –protects what words you are reading. But, can I still guess the web site you are visiting without knowing the content? –SSL doesn’t multiplex requests: the size of each object is easily known! [Danezis]. –You can give each web size a signature based on object sizes. [Sun et al] What if we multiplex the streams? –Any VPNs and WEP-like protection will do this. –Pipelined HTTP 1.1 has a similar effect. –Can network timing characteristics leak a signature?

HTTP/SSL Signatures [Sun et al] tried identifying web sites by the object sizes. 85% identification rate! Each web “object” gets a separate SSL request All objects go through a tunnel.

Yahoo.com Time Cumulative Bytes received Google.com Time Cumulative Bytes received

Experiment Five months of a Mozilla browser visiting 100 sites (most popular from previous study) once each every 30 minutes. –We recorded the encrypted version of each request. –Data was broken up into two halves: training and testing. Two methods of characterization –The ordered packet sizes: We don’t care when they arrived –The ordered packet interarrival times: We don’t care about their size. Comparison by cross correlation.

Defenses Packet size: –Easiest to measure from any point in the Internet –But, this is easiest to fix at Access Point base station, or VPN endpoint: You can pad packets easily to thwart attackers. Do we need to pad acks? Does this kill perfomance? Interarrival times: –This is harder to fix, as there are many sources of delay. –We are experimenting with adding random noise at an AP. –Performance question more relevant here

Extrapolating… Can we flip the attack on its head? –Capture traffic going to and from a user; does the traffic identify her later given a repeat in visited sites? Can we combine this technique with other signatures for a more robust attack: –There are other dependencies that can be brought into the probabilities –Each user has a collection of web sites they historically visit –Given that one web site has been identified, does that influence our next guess? –Given our location (a café), time of day, etc…, Personal mobile privacy firewalls as a solution?

Lalana’s Questions… What are technologies that lead to loss of privacy? Is the loss of privacy worth the advantages? Are there technologies that provide some level of privacy control to users? - Should we be concerned about the "second hand" privacy loss that can occur when my wearable computing system records my interactions with you with or without your consent? What is the best approach for pervasive computing systems: more personalization or greater privacy?