Making the Neutral Traffic Matrix More Meaningful Joseph Choi.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

A Probabilistic Analysis of Onion Routing in a Black-box Model 10/29/2007 Workshop on Privacy in the Electronic Society Aaron Johnson (Yale) with Joan.
AT&T Labs - Research An Information-Theoretic Approach to Traffic Matrix Estimation Yin Zhang, Matthew Roughan, Carsten Lund – AT&T Research David Donoho.
Preliminary Road Map to Information Distribution AMHS-SWIM Workshop 5-6 March 2012 Chiang Mai, Thailand SP/4.
Network Design and Implementation
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
Reusable Anonymous Return Channels
NetCamo Camouflaging network traffic at right time and right place
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Reducing Network Latency Paul Johnson CPSC APRIL 05 Using an Intelligent Service to Determine the Cheapest Communications Path.
Multiple Sender Distributed Video Streaming Thinh Nguyen, Avideh Zakhor appears on “IEEE Transactions On Multimedia, vol. 6, no. 2, April, 2004”
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
Objectives Keep network activity anonymous and unobservable Provide QoS-guaranteed communication services Be upward and downward compatible with existing.
TAMU and NSWC July Objectives Keep network activity anonymous and unobservable Provide QoS-guaranteed communication services Be upward and downward.
Applied Cryptography for Network Security
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Enhanced Secure Dynamic DNS Update with Indirect Route David Wilkinson, C. Edward Chow, Yu Cai 06/11/2004 University of Colorado at Colorado Springs IEEE.
Electronic Commerce Semester 1 Term 1 Lecture 2. Forces Fuelling E-Commerce Interest in e-commerce is being fuelled by: –Economic forces –Customer interaction.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Toward Understanding Congestion in Tor DC-area Anonymity, Privacy, and Security Seminar January 24 th, 2014 Rob Jansen U.S. Naval Research Laboratory *Joint.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Yang Chen.  More and more people are using online SNS to share their photos, news, …  Large Amount of data from the SNS site to the end users  How.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Traffic Analysis Prevention Chris Conger CIS6935 – Cryptographic Protocols 11/16/2004.
The Transformation Center Helping Good Ideas Travel Faster Cathy Kaufmann, MSW Executive Director, OHA Transformation Center.
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Shannon Lab 1AT&T – Research Traffic Engineering with Estimated Traffic Matrices Matthew Roughan Mikkel Thorup
Interdisciplinary Education on Smart Grids: Lessons, Challenges, and Opportunities Visvakumar Aravinthan and Vinod Namboodiri Department of Electrical.
1 Quasi-Anonymous Channels Ira S. Moskowitz --- NRL Richard E. Newman --- UF Paul F. Syverson --- NRL Center for High Assurance Computer Systems Code 5540.
DATA COMM & COMPUTER NETWORKING. Data Communications..  are the exchange of data between two devices via some  form of transmission medium such as a.
Analysis of the Impact and Interactions of Protocol and Environmental Parameters on Overall MANET Performance Michael W. Totaro and Dmitri D. Perkins Center.
Data Communications and Networking CSCS 311 Lecture 2 Amjad Hussain Zahid.
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
Spatio-Temporal Compressive Sensing Yin Zhang The University of Texas at Austin Joint work with Matthew Roughan.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
Wireless Sensor Networks In-Network Relational Databases Jocelyn Botello.
RPR-SCTP Will Jenkins and Kennabec Walp Adv. Comp. Net. SystemsElectrical & Computer Engineering Mississippi State University Advanced Computer Network.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
1 Anonymity and Covert Channels in Simple, Timed Mix-firewalls Richard E. Newman --- UF Vipan R. Nalla -- UF Ira S. Moskowitz --- NRL
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm Mike Yuan CS 6/73201 Advanced Operating Systems Fall 2007 Dr. Nesterenko.
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
Security in Wireless Sensor Networks by Toni Farley.
Traffic Matrix Approach R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
December 4, 2002 CDS&N Lab., ICU Dukyun Nam The implementation of video distribution application using mobile group communication ICE 798 Wireless Mobile.
Effects of adding Arbitrary Physical Nodes to a Mobile Ad-Hoc Network Utilizing an Anonymity System By Ian Cavitt.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Effectiveness of Blending Attacks on Mixes Meng Tang.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Making the Neutral Traffic Matrix More Meaningful Joseph Choi.
Game Theoretic Model of Censorship Resistance Andrei Serjantov University of Cambridge Computer Laboratory.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
NETWORK SECURITY HERD: A SCALABLE, TRAFFIC ANALYSIS RESISTANT ANONYMITY NETWORK FOR VOIP SYSTEMS JINGTAO YAO JIAJUN LI ACM HORNORED CLASS.
Modified Onion Routing and its Proof of Concept By: Gyanranjan Hazarika.
Technical Requirements for IEEE ESS Mesh Networks
Anonymity - Background
Amar B. Patel , Shushan Zhao
COVERT STORAGE CHANNEL MODULE
Cellular Telephone Networks
Presentation transcript:

Making the Neutral Traffic Matrix More Meaningful Joseph Choi

Given a global passive adversary, want to prevent the adversary from deriving information from observed traffic patterns. Currently, produce a Neutral TM by: (1) Rerouting, (2) Padding, and (3) Delaying Padding acts as a placeholder. – Holds no meaning – Increases traffic load Is there something better?

Segmenting Messages Instead of rerouting entire messages, is it reasonable to split them up? – Every exchange within the network will serve a purpose in sender-to-receiver delivery – Non-active nodes aren’t pressured to create artificial traffic and can focus on rerouting Considerations: – Additional processing cost mainly incurred to sender and receiver – Coordinating rerouting of both entire messages and segmented messages

Action Plan I.Discovery 1)Neutral TM creation/agreement among parties 2)3 traditional means 3)Existing alternate methods II.Build a new set of tools 1)Come up with new ideas 2)Implementation of new ideas III.Experimentation & Measurement 1)Build neutral, observed TM from actual TM 2)Build set of compatible TMs to observed TM

Resources: Richard E. Newman, Ira S. Moskowitz, Paul Syverson and Andrei Serjantov. “Metrics for Traffic Analysis Prevention,” In PET 2003, Dresden, March R.E. Newman-Wolfe and B.R. Venkatraman. “High Level Prevention of Traffic Analysis,” Seventh Annual Computer Security and Applications Conference, San Antonio, Texas, December 2-6, 1991, pp B.R. Venkatraman and R.E. Wolfe. “Capacity Estimation and Auditability of Network Covert Channels,” 1995 IEEE Computer Society Symp. Security and Privacy, pp X. Fu, B. Graham, Y. Guan, R. Bettati and W. Zhao. “NetCamo: Camouflaging Network Traffic for Real-Time Applications,” Texas Workshop Security of Information Systems, April Yin Zhang, Matthew Roughan, Carsten Lund, and David Donoho. “An information-theoretic approach to traffic matrix estimation,” 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Karlsruhe, Germany, August 25-29, Questions?