A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security.

Slides:



Advertisements
Similar presentations
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Advertisements

Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Network Attacks Mark Shtern.
Small-world Overlay P2P Network
Slicing the Onion: Anonymous Routing without PKI Saurabh Shrivastava CS 259
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
1 Modeling and Analysis of Anonymous-Communication Systems Joan Feigenbaum WITS’08; Princeton NJ; June 18, 2008 Acknowledgement:
15-441: Computer Networking Lecture 26: Networking Future.
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Tirgul 8 Universal Hashing Remarks on Programming Exercise 1 Solution to question 2 in theoretical homework 2.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Analysis of Onion Routing Presented in by Jayanthkumar Kannan On 10/8/03.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Delivery, Forwarding, and Routing
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Towards an Analysis of Onion Routing Security Syverson, Tsudik, Reed, and Landwehr PET 2000 Presented by: Adam Lee 1/26/2006 Syverson, Tsudik, Reed, and.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Communication (II) Chapter 4
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Secure Group Communication: Key Management by Robert Chirwa.
Wireless TCP Prasun Dewan Department of Computer Science University of North Carolina
Streaming over Subscription Overlay Networks Department of Computer Science Iowa State University.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Lecture 14: Anonymity on the Web (cont) Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Consider a network in which for any two nodes directly connected with a link, a message either reaches its destination within T time or gets lost. (a)
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan.
Onion Routing R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Tor and Timing Attacks An attack within the accepted attacker model.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Anonymous Communication
0x1A Great Papers in Computer Security
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
Anonymous Communication
‘Crowds’ through a PRISM
Anonymous Communication
Presentation transcript:

A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, : Adv. Network Security

Overview Act I: Hordes –Applying a tool elsewhere Act 2: The “Predecessor Attack” –How it works –Proof –Analysis –Simulation Act 3: (then) Future Directions

A New Application Brian Levine & Clay Shields –Multicast & Networking Properties of Multicast –many receivers –tree structure –subscription model Status is unknown to routers and hosts Bad for maintenance –efficient for streaming

One Issue w/ Crowds Crowds –Network costs are high –TCP over multiple hops is bad for streams I W R Z XY

Hordes Crowds 4 outgoing –(requests, ACKs) Multicast 4 incoming streams –Everyone joins multiple trees –Don’t know who’s on each tree –Don’t know who’s listening

Act I Lessons Understanding Prior Work –Find problems & try to solve them Apply New Tools –Rather, old tools, but new to the area

Act II: Another Issue w/ Crowds What does say? What does it not say?

Adding New Members If paths are maintained indefinitely, any member joining the group would be immediately identifiable as the initiator. Because of this, group joins occur in batches (e.g., once every hour). Each time new members are allowed in, new paths are created for all members.

W B Z Intuitive notion of passive attacks A E Y X T D C A

Attacking Crowds Paths change Attacker sees session-identifying info –Responder’s IP address –Cookie, login name, specific content Z I R Y X A

Attacking Crowds Paths change Attacker sees session-identifying info –Responder’s IP address –Cookie, login name, specific content Z I R Y X A

Log the node before the attacker –n Crowds nodes Attacking Crowds I 123L … When in this position prob=1 that initiator is predecessor. When in any of these positions, prob=1/n for any node as predecessor. node count I 41 X18 Y24 Z17

Question What are the contributions of WALS02?

Attacking in General Attack applies to any protocol for anonymity, provided that: –Paths* of proxies change –Uniformly random selection of paths –There exists a position of attackers: see the initiator send messages in the session determine the session information

Goal: Quantify time required for attack to succeed Notation – n is the number of Crowds nodes – c is the number of attackers nodes (c < n ) Observations – Probability of selecting an attacker for a given position: (c / n ) Crowds Analysis n - nodes c - attackers

Crowds Analysis ABIXYZ …… T rounds (path reformations) 1/2 E(I) No. of times each node is seen by the attackers

Crowds Analysis Chernoff bounds –Q: How big does T have to be? –A: The attacker must be in the first position on the initiator’s path several times c/n chance n/c expectation –O(n/c log n) times to get a high probability (n-2)/n n - nodes c - attackers

Initiator-chosen paths −Instead of flipping a coin, the Initiator chooses the entire path and builds an onion. I  X  Y  Z  R −Layered encryption of data using the public key of each proxy in the path. Onion Routing (GRS96) data{R,data} Kz+ {Z,{R,data} Kz+ } Ky+ {Y,{Z,{R,data} Kz+ } Ky+ } Kx+ Sending the onion I  X: {Y,{Z,{R,data} Kz+ } Ky+ } Kx+ X  Y: {Z,{R,data} Kz+ } Ky+ Y  Z: {R,data} Kz+ Z  R: data

Onion Routing A1DeltaA2 3:12:203:12:30 3:12:373:12:47 3:12:493:12:59 I A1 R A2 X 17 ms 12 ms Y

Mix-Nets (Ch81+) Same as Onion Routing Added –Dummy messages –Batching –Message reordering Stops Timing attacks

Insufficient to have just one node Timing analysis allows two attackers to link I and R The exponent is intuitively related to the number of positions on the path needed to mark an entry. O( (n/c) 2 log n) path resets Attacking Onion Routing I A1 R A2 XY n - nodes c - attackers

Attacking Mix-Nets Mixing –Reordering messages –Dummy messages –Delay Stops timing attacks –O.R. attack no longer works –Need the entire path to trace the message To attack Mix-nets, if the path is L nodes long, then L attackers have to appear in sequence. –In each round, chances are (c/n) L. O( (n/c) L log n) path resets n - nodes c - attackers

Summary of Predecessor Attacks Attack effects all systems of anonymous communications. Apparent trade-off between performance and security. ProtocolRounds Crowds, Hordes O(n/c log n) Onion Routing O((n/c) 2 log n) Mix-Nets O((n/c) L log n) DC-Ring O(n log n) DC-Full Requires c=n-1 attackers n - nodes c - attackers

Act II Lessons Answer open questions –Is it efficient enough for X application? –What are the tradeoffs here? Generalize solutions (or attacks) –Where else does this apply? –Can it be modified to apply to a group? With what costs/issues?

Act III: The next step What did WALS02 leave unanswered?

Questions (II) Consequences for users? –You’re not secure forever How tight are these bounds? Are there defenses?

Assumptions that can be broken We assumed that all nodes are chosen for each spot on the path with equal probability –What if nodes are chosen with a bias?