Denial-of-Service Flooding Detection in Anonymity Networks Computer Networks & Communications Group Institute for IT-Security and Security Law University.

Slides:



Advertisements
Similar presentations
Secure Routing Panel FIND PI Meeting (June 27, 2007) Morley Mao, Jen Rexford, Xiaowei Yang.
Advertisements

Keiji Maekawa Graduate School of Informatics, Kyoto University Yasuo Okabe Academic Center for Computing and Media Studies, Kyoto University.
Network Security Highlights Nick Feamster Georgia Tech.
Chris Karlof and David Wagner
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
10/21/20031 Framework For Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Kavita Chada & Viji Avali CSCE 790.
Introduction (Pendahuluan)  Information Security.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Who am I? Mats Ohlin Swedish Defence Materiel Administration (FMV) IT Security area –International Standardisation: ISO/IEC JTC 1/SC 27/WG 3 (Security.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
SANE: A Protection Architecture for Enterprise Networks
CSC8320. Outline Content from the book Recent Work Future Work.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Anonymity on the Internet Presented by Randy Unger.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Mitigating DoS Attack Through Selective Bin Verification Micah Sherr a, Michael Greenwald b, Carl A. Gunter c, Sanjeev Khanna a, and Santosh S. Venkatesh.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows Nabil Schear David M. Nicol University of Illinois at Urbana-Champaign Department.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Introduction to Network Systems Security Mort Anvari.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
Draft-dvir-roll-security-authentication-01 and draft-dvir-roll-security-key-agreement Amit Dvir Laboratory of Cryptography and System Security (CrySyS)
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-00.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
0x1A Great Papers in Computer Security
Anonymity - Background
Presentation transcript:

Denial-of-Service Flooding Detection in Anonymity Networks Computer Networks & Communications Group Institute for IT-Security and Security Law University of Passau Germany Performance Measurement and Management for Two-Level Optimization of Networks and Peer-to-Peer Applications (GR/S69009/01) Network of Excellence: Design and Engineering of the Future Generation Internet (IST ) Jens Oberender Melanie Volkamer Hermann de Meer MonAM 2007 LAAS-CNRS, Toulouse, France 5. November 2007

Attacks in Anonymity Networks  Chaum’s Mixer  A sender remains anonymous, if an adversary catches no evidence on sender identity  How to protect receivers from anonymous flooding attacks? 1. Enable traffic flow detection  DoS attack detection 2. Prevent anonymity breach  protect sender identity  Message Tagging DoS Flooding Detection in Anonymity Networks2

Linkability Continuum  Two messages are linkable by an adversary, if evidence on their relation can be provided.  Pseudonyms –Adversary links all messages  malicious profiling  Unobservability +Observer cannot link any messages together  Limited Linkability  Restricted number of linkable messages  Enables traffic flow clustering DoS Flooding Detection in Anonymity Networks3 1  NoneLifelong #Messages per Profile Message Linkability Limited

Attacker Model Security Objectives 1. Limited linkability 2. Linkability resistant to malicious influence DoS Flooding Detection in Anonymity Networks4 Privacy Adversary Aim: disclose sender anonymity Observe incoming tags Collude with other DoS engines Message Flooding Attacker Aim: Denial-of-Service Exhausts victim resources DoS Mitigation Adversary Access Control Attacker Anonymity Network Access Control Adversary Receiver Access Control Adversary Receiver Assumptions  Anonymity Network unbroken  Access Control Entity trusted by sender & receivers

Message tagging  Fast, local traffic flow cluster criteria  Hash from characteristic strings (key derivation function)  Values not comparable with fresh salt  Linkability control Tag properties  Sender differentiate senders  Receiverdisables cross-server profiling  Time Framedisables lifelong linkability DoS Flooding Detection in Anonymity Networks5

Internal vs. External Tags Anonymity Attack using external tags  Collude to learn anonymous paths Proposed internal Message Tagging  Tags reside within encrypted channel DoS Flooding Detection in Anonymity Networks6

Clustering of Anonymous Traffic Flows  Anonymous Messages  Header data stripped off, application level analysis needed  Message tags enable flow clustering  Clusters of [ Sender,  ] at Engine  Detection frames cluster partial message flows  Arrival rate DoS Flooding Detection in Anonymity Networks7

Clustering of time-based Tags DoS Flooding Detection in Anonymity Networks8

Scalability Issues  Clock skew in distributed systems  misuse degrades linkability Access control entity  Counts messages per sender  Logarithm effects on tag DoS Flooding Detection in Anonymity Networks9 Traffic flow classification  Arrival rate per message tag  Activity profiling

Sender Linkability  Scales with message volume  Depends on arrival rate towards each receiver  Message tags collisions  Flow splitting increases linkability  Incentive mechanism  Strategic players’ goal: maximize privacy  Inoffensive communication encouraged DoS Flooding Detection in Anonymity Networks10

Multiple sender identities  Equivalent to DDoS  No defense against attacks from different sender identities, but…  Example BotNets  Anonymity for attacker only  Proxy functionality  Yet these don’t spy SMTP authentication  Anonymity networks  No need to operate a BotNet  Anonymous attacks using real identity  Hard-to-detect without add-ons  Benefits the privacy of the broad public! DoS Flooding Detection in Anonymity Networks11

Conclusions  Partial traffic flows  Ability to detect Anonymous DoS Flooding Attacks state-of-the-art techniques applicable  Sender Anonymity maintained  Sender Privacy  Defense of cross-server profiling  Restricted amount of message linkable  Arrival Rate  Linkability DoS Flooding Detection in Anonymity Networks12 Jens Oberender