Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall University.
Internetworking II: MPLS, Security, and Traffic Engineering
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Forensic Dead-Ends: Tracing Anonymous R er Abusers Len Sassaman The Shmoo Group
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
1 Representing Identity CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 19, 2004.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Internet Basics.
Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
CSCI 6962: Server-side Design and Programming
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CSCI 5234 Web Security1 Privacy & Anonymity in the WWW Ch. 12, Oppliger.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Secure Socket Layer (SSL)
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Anonymity on the Internet Presented by Randy Unger.
Chapter 9 How Do Users Share Computer Files?. What is a File Server A (central) computer which stores files which can be accessed by network users.
Privacy Enhancing Technologies Spring What is Privacy? “The right to be let alone” Confidentiality Anonymity Access Control Most privacy technologies.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
CSC 382: Computer SecuritySlide #1 CSC 382: Computer Security Identity.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Security, Social and Legal Issues Regarding Software and Internet.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
A Little Bit About Cookies Fort Collins, CO Copyright © XTR Systems, LLC A Little Bit About Cookies Instructor: Joseph DiVerdi, Ph.D., M.B.A.
Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec
Mixminion: Design of a Type III Anonymous R er Protocol George Danezis Roger Dingledine Nick Mathewson Presented By Michael LeMay.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 19 PHILLIPA GILL - STONY BROOK U.
The Silk Road: An Online Marketplace
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
1 Anonymous Communications CSE 5473: Network Security Lecture due to Prof. Dong Xuan Some material from Prof. Joan Feigenbaum.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Chapter 8 Building the Transaction Database
Anonymous Communication
Protocols for Anonymous Communication
The University of Adelaide, School of Computer Science
0x1A Great Papers in Computer Security
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Anonymous Communication
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Electronic Payment Security Technologies
Anonymous Communication
Presentation transcript:

Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University

Section Overview Browser Privacy Issues Browser Privacy Issues Web Server Tracking Web Server Tracking Phishing Attacks Phishing Attacks Anonymous Browsing Anonymous Browsing High Latency Anonymity High Latency Anonymity Low Latency Anonymity Low Latency Anonymity

References Security in Computing, 3 rd Ed. Security in Computing, 3 rd Ed. Chapter 7 (pg. 453) Chapter 7 (pg. 453) Chapter 9 (pgs ) Chapter 9 (pgs )

View of most internet users… Source: Peter Steiner Source: Peter Steiner, The New Yorker,The New Yorker, (Vol.69 (LXIX) no. 20), 1993

Addresses Enables online communication Enables online communication Often users have several Often users have several Disposable accounts (pseudonyms) Disposable accounts (pseudonyms) Easily forged Easily forged Social engineering attacks Social engineering attacks User anonymity? User anonymity? header analysis header analysis

Browser Privacy History of sites visited History of sites visited Saved form information Saved form information Saved passwords Saved passwords Page cache Page cache Downloads Downloads Cookies Cookies

HTML Cookies Introduced by Netscape Introduced by Netscape Stores information about sites visited Stores information about sites visited Read and written to by Web Server Read and written to by Web Server Contains user web site preferences, etc. Contains user web site preferences, etc. Map of user interests Map of user interests Passes this information when site is visited Passes this information when site is visited Advertisement images Advertisement images Browser Settings Browser Settings Accept all cookies Accept all cookies Accept only those cookies that get sent back to originating server Accept only those cookies that get sent back to originating server Do not except cookies Do not except cookies

Web Server Tracking Web Server log files Web Server log files Web Site registration databases Web Site registration databases Web Bugs Web Bugs 1x1 pixel or transparent GIF images 1x1 pixel or transparent GIF images Site logs IP address and cookie information Site logs IP address and cookie information Referring page for “credit” Referring page for “credit” Can appear in HTML s Can appear in HTML s

Phishing Identify Theft Attack Identify Theft Attack Appears sent from legitimate institution Appears sent from legitimate institution Warns of information compromise Warns of information compromise Link to “legitimate institution” site Link to “legitimate institution” site Asks to verify personal information Asks to verify personal information Passwords Passwords Bank Account Numbers Bank Account Numbers Social Security Numbers Social Security Numbers

Need for Anonymity Discussion of Medical Conditions Discussion of Medical Conditions Whistle Blowing Whistle Blowing Political/Religious Censorship Political/Religious Censorship Electronic Voting Electronic Voting Transaction Privacy (Digital Cash) Transaction Privacy (Digital Cash) Corporate research Corporate research Law Enforcement investigations Law Enforcement investigations

Anonymous Communication Sender Anonymity Sender Anonymity Receiver Anonymity Receiver Anonymity Sender/Receiver unlinkability Sender/Receiver unlinkability Unobservability Unobservability Anonymity Set: Must not be able to identify one member within a set of people.

Anonymity & Latency High latency systems High latency systems /Newsgroup services /Newsgroup services Good resistance to attacks Good resistance to attacks Slow!!! Slow!!! Low latency systems Low latency systems Need quick response to requests Need quick response to requests Web and interactive services Web and interactive services Less resistant to attacks Less resistant to attacks

Pseudo-anonymous R er Real Address Anonymous address anon.penet.fi “Legal Attacks”

Anonymous R ers David Chaum Mixes Server order (chains) picked Server order (chains) picked Message encrypted in reverse order using each server’s public key Message encrypted in reverse order using each server’s public key Server decrypts message to see where to send next Server decrypts message to see where to send next Source Destination

Type I R er “Cypherpunk” “Cypherpunk” PGP Based PGP Based Subject to traffic analysis Subject to traffic analysis Messages immediately delivered Messages immediately delivered Message size changes Message size changes Nym Servers Nym Servers Reply block chain Reply block chain Reused (often) Reused (often)

Type II R ers “Mixmasters” “Mixmasters” Follows (much) of Chaum’s model Follows (much) of Chaum’s model Internally implemented PKE Internally implemented PKE Fixed payload & message splitting Fixed payload & message splitting Message pools/Bogus messages Message pools/Bogus messages No reply blocks No reply blocks

Type III R ers “Mixminion” “Mixminion” Implements Type II features Implements Type II features Fixed message size (32KB) Fixed message size (32KB) Single use reply blocks Single use reply blocks Custom delivery protocol Custom delivery protocol No longer using SMTP No longer using SMTP User implemented User implemented

Proxy Anonymizers UserWorkstation Web Anonymizer Enter Web Site Submit Reset Browser WebAnonymizer

Crowds UserWorkstation Each member passes web request to another member of crowd or to destination server depending on randomly generated probability

Onion Routing UserWorkstation Using the mix model, get the public keys from each onion router then encrypt the request with each key starting from last hop and finishing with nearest one.

Tor Routing UserWorkstation User creates a virtual circuit by securely establishing session keys with each Tor router. Once the circuit is set up, communication to remote hosts can occur when needed

Dining Cryptographers The waiter tells 3 cryptographers who are having dinner that the bill has been taken care of. The waiter tells 3 cryptographers who are having dinner that the bill has been taken care of. The payer chooses to be anonymous The payer chooses to be anonymous One of the cryptographers One of the cryptographers Their boss – the NSA Their boss – the NSA Diners will only agree if the NSA isn’t buying Diners will only agree if the NSA isn’t buying How do they decide? How do they decide? Each flips a coin that only he and the diner to is right can see. Each flips a coin that only he and the diner to is right can see. Each diner looks at his coin and the one to his left Each diner looks at his coin and the one to his left Not buying: announces whether the coins are the same or different Not buying: announces whether the coins are the same or different Buying: lies by announcing the opposite Buying: lies by announcing the opposite Odd number of “different”, someone at the table is buying Odd number of “different”, someone at the table is buying

DC Example Alice Bob Scott “Different” “Same” “Same” Someone at the Table (Scott) is buying [odd # of “Different”] Alice Bob Scott “Different” “Different” “Same” The NSA is buying [even # of “Different”]

DC-Nets Also proposed by David Chaum Also proposed by David Chaum Need secure channel between adjacent proxies Need secure channel between adjacent proxies Each proxy generates random bit Each proxy generates random bit Non-sender: announce xor (its bit, neighbor bit) Non-sender: announce xor (its bit, neighbor bit) Sender: announce xor (its bit, neighbor bit, message bit) Sender: announce xor (its bit, neighbor bit, message bit) Xor (all announcements) = message bit Xor (all announcements) = message bit Impractical Impractical Need to be able to generate lots of randomness Need to be able to generate lots of randomness Huge communication overhead Huge communication overhead