How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.

Slides:



Advertisements
Similar presentations
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
CSE 222a Final Project - UCSD Spring 2007 p2p DNS addressing Presented By- Anup Tapadia Alexander Loukissas Justin Wu.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Green Computing Energy in Location-Based Mobile Value-Added Services Maziar Goudarzi.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Mohamed F. Mokbel University of Minnesota
1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
System Configuration: DHCP and Autoconfiguration Chapter 6.
A reactive location-based service for geo-referenced individual data collection and analysis Xiujun Ma Department of Machine Intelligence, Peking University.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
Internet Protocol Security (IPSec)
11 Introduction Dr. Miguel A. Labrador Department of Computer Science & Engineering
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic Maxim Raya Jean-Pierre Hubaux June 2010, WEIS’10 David C. Parkes.
A Model of IPv6 Internet Access Service via L2TPv2 Shin Miyakawa NTT Communications 2006/7/10 IETF66th.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
6 am 11 am 5 pm Fig. 5: Population density estimates using the aggregated Markov chains. Colour scale represents people per km. Population Activity Estimation.
 Zhichun Li  The Robust and Secure Systems group at NEC Research Labs  Northwestern University  Tsinghua University 2.
What DNS is Not 0 Kylie Brown, Jordan Eberst, Danielle Franz Drew Hanson, Dennis Kilgore, Charles Newton, Lindsay Romano, Lisa Soros 0 Paul Vixie
Monitoring for network security and management Cyber Solutions Inc.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
1 Energy-efficient Localization Via Personal Mobility Profiling Ionut Constandache Co-authors: Shravan Gaonkar, Matt Sayler, Romit Roy Choudhury and Landon.
Security Games in Online Advertising: Can Ads Help Secure the Web? JP Hubaux Joint work with N. Vratonjic, M. Raya, and D. Parkes.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Protecting Students on the School Computer Network Enfield High School.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
Wireless Network Design Principles Mobility Addressing Capacity Security.
PRISM: Private Retrieval of the Internet’s Sensitive Metadata Ang ChenAndreas Haeberlen University of Pennsylvania.
Characterising the Use of a Campus Wireless Network 徐 志 賢 Paper From: D. Schwab and R.B. Bunt, "Characterising the Use of a Campus Wireless Network", Proc.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
1 Jong Hee Kang, William Welbourne, Benjamin Stewart, Gaetano Borriello, October 2004, Proceedings of the 2nd ACM international workshop on Wireless mobile.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Contents Introduction What are Location-based services Working of Location-based services Location Tracking Technologies Power profiling a mobile phone.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Unraveling an old cloak: k-anonymity for location privacy
Optimizing the Location Obfuscation in Location-Based Mobile Systems Iris Safaka Professor: Jean-Pierre Hubaux Tutor: Berker Agir Semester Project Security.
Location-Based Services Henning Schulzrinne Columbia University.
1 IP2Geo: Locating Internet Hosts Geographically Venkat Padmanabhan Microsoft Research Joint work with L. Subramanian (UC Berkeley)
© 2015 Infoblox Inc. All Rights Reserved. Tom Coffeen, IPv6 Evangelist UKNOF January 2015 Tom Coffeen, IPv6 Evangelist UKNOF January 2015 DHCPv6 Operational.
Design & Implementation of Black Sea Information System Approaches & Considerations.
The Hacking Suite For Governmental Interception.
View2surf™ by Moben Monetizing Mobile.
Information Security, Theory and Practice.
Hotspot Shield Protect Your Online Identity
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
Reach People when it matters with Location Extensions
563.10: Bloom Cookies Web Search Personalization without User Tracking
Dude, where’s that IP? Circumventing measurement-based geolocation
Auditing Etsy The Security of Etsy
Phillipa Gill University of Toronto
A Unified Framework for Location Privacy
Presentation transcript:

How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS 2013, 07/2013 1

How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots GPS-Level Geo-location at Public Hotspots: A Crowd-Sourcing Approach Based on Shared Public IPs location Information (e.g., LBS) location information co-location information (e.g., same IP) 2

Location Information The place one visits convey a large amount of (sensitive) information Location information is valuable Offers context-aware services Creates new revenue opportunities Potential to provide targeted advertisements (US$ Billion ad revenue in the US in 2011) Web services are interested in obtaining users’ locations Users reveal their locations to Location-Based Services (LBS) in exchange for context-aware services Non-LBS service providers rely on IP – location i.e., determining a location from an IP address 3

IP-Location Services Provides IP address to geo-location translation Active techniques (e.g., delay measurements) Passive techniques Databases with records of IP – location mappings Commercial (e.g., Quova Inc., MaxMind, IP2Location) Free (e.g., HostIP, IPInfoDB) Results are not very accurate (country-, state-, city-? level) Incentives for service providers (e.g., Google) to implement fine- grained IP geo-location techniques 4

Adversary & Threat Goal: Learn (and exploit) users’ (current) locations e.g., monetize through location-targeted ads Adversary: Service providers that Offer either LBS or geo-location service Might offer other online services (e.g., webmail, search, etc.) Threat: Location privacy compromised by others Location + co-location information 5 location Information (e.g., LBS) location information co-location information (e.g., same IP)

The Threat Access Point (AP) Mobile Phone private IP: Location-Based Service Mobile Phone (GPS) Web Server Request (IP: a.b.c.d) Controlled by the adversary 6

DHCP Lease & IP Change Inference 7 Access Point (AP) Public IP obtained by DHCP Uses Network Address Translation (NAT) Laptop HTTP Request Cookie (IP: a 1.b 1.c 1.d 1 ) Renew IP a 1.b 1.c 1.d 1 DHCP lease Renew IP HTTP Request Cookie (IP:a 2.b 2.c 2.d 2 ) Renew IP a 2.b 2.c 2.d 2 Web Server

Quantifying the Threat 8 A5A5 D1D1 A6A6 A7A7 D4D4 Vulnerability Window W t T – IP periodicity A i /D i – arrival/departure LBS i – LBS req. from user i Std i – Standard req. from user i Auth i – Authenticated req. from user i Victims : |{U4, U6, U7}|= 3 (ads), |{U5, U7}|= 2 (tracking) Proportion of Victims: Victims/(N Con + λ Arr T) Std 7 Std 4 Std 6 LBS 5 T Comp kT (k+1)T  Compromise time T Comp : First LBS query in T  Probability of the adversary successfully obtaining the mapping Renew IP Auth 5 Auth 7

System Model Users U Connecting to AP: Poisson (λ Arr ) Connection duration: exponential distribution λ Dur Stationary system Number of connected users N Con = λ Arr / λ Dur LBS, standard, authenticated requests: Poisson* (λ LBS ), (λ Std ), (λ Auth ) Access point AP At location (x,y) Single dynamic public IP with lease T, renewed with prob. p New Adversary Goal: obtain M AP =(IP ↔Loc) mapping 9

Success of the Adversary 10

EPFL Data Set Traces collected from 2 EPFL campus Wi-Fi APs over 23 days in June 2012 User session, traffic and DNS traces 4302 users in total (136 users on average around 6PM) Considered traffic to Google services 17% of the traffic; 81.3% of the users access at least one Google service 9.5% of the users generate LBS requests 11  Measured the compromise time and the proportion of victims  Measured the probability of inferring IP changes

Results – Victims (ads) 12  Users start arriving around 7AM Theoretical T Comp = 7:42 AM Experimental T Comp = 8:25 AM Compromised location privacy of 90% of Google users

Probability of Inferring the IP Change 13

Countermeasures (Oh boy what can I do?!) Hiding users’ actual IPs from the destination Relay-based communication (e.g., Tor, mix networks, proxies) Virtual Private Networks (VPNs) ISPs implementing country-wide NAT or IP Mixing Decreasing the knowledge of the adversary Reducing accuracy of the reported location (e.g., spatial cloaking, adding noise) Increase adversary’s uncertainty (e.g., inject dummy requests) Adjust the system parameters Reduce the DHCP lease, always allocate a new IP, IP change when the traffic is low Do-not-geolocalize initiative Opt-out of being localized 14

Conclusions Location privacy at hotspots can be compromised by other users Consequence of network operational mode i.e., APs with NATs Scale of the threat is immense New business opportunities for service providers Users’ lack of incentives to coordinate and their lack of know-how impede the wide deployment of the countermeasures 15