Victor Farbman and Maxim Trosman Under guidance of Amichai Shulman.

Slides:



Advertisements
Similar presentations
Tor: The Second-Generation Onion Router
Advertisements

LASTor: A Low-Latency AS-Aware Tor Client
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
Trust-based Anonymous Communication: Models and Routing Algorithms Aaron Johnson Paul Syverson Roger Dingledine Nick Mathewson U.S. Naval Research Laboratory.
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation Kevin Bauer 1 Micah Sherr 2 Damon McCoy 3 Dirk Grunwald 4 1 University of Waterloo 2.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
Privacy Protection In Grid Computing System Presented by Jiaying Shi.
Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Toward Understanding Congestion in Tor DC-area Anonymity, Privacy, and Security Seminar January 24 th, 2014 Rob Jansen U.S. Naval Research Laboratory *Joint.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
The Current Landscape of P2P File Sharing: Challenges and Future Directions Kevin Bauer Ph.D. candidate University of Colorado.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Othman Othman M.M., Koji Okamura Kyushu University 1.
報告者 : 張逸文 D ETECTING T RAFFIC S NOOPING IN T OR U SING D ECOYS RAID 2011 Sanbuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angilos.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering.
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows Nabil Schear David M. Nicol University of Illinois at Urbana-Champaign Department.
Secure In-Network Aggregation for Wireless Sensor Networks
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
LASTor: A Low-Latency AS-Aware Tor Client. Tor  Stands for The Onion Router  Goals: Anonymity ○ Each hop only knows previous and next hop on a path.
Strengthening Tor against Eavesdropping Correlation Attacks Robert Thomas CSCE APR 2015 Audio:
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Effectiveness of Blending Attacks on Mixes Meng Tang.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Some Great Open Source Intrusion Detection Systems (IDSs)
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Privacy-Implications of Performance-Based.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum
Tor Good + Evil.
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
CPS 512 midterm exam #1, 10/5/17 Your name please: NetID:_______ Sign for your honor:____________________________.
Privacy Through Anonymous Connection and Browsing
0x1A Great Papers in Computer Security
Anupam Das , Nikita Borisov
Anupam Das , Nikita Borisov
Privacy-Preserving Dynamic Learning of Tor Network Traffic
Amar B. Patel , Shushan Zhao
Network Architecture for Cyberspace
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
The MobileIron® Threat Detection difference:
Outline System architecture Current work Experiments Next Steps
Botnet Detection by Monitoring Group Activities in DNS Traffic
Rob Jansen, U.S. Naval Research Laboratory
Presentation transcript:

Victor Farbman and Maxim Trosman Under guidance of Amichai Shulman

 Background  Project’s goal  Our solution  Results  Protection  Conclusions

 How it works BackgroundProject’s goalOur solutionConclusionsProtection

BackgroundProject’s goalOur solutionConclusionsProtection

BackgroundProject’s goalOur solutionConclusionsProtection

BackgroundProject’s goalOur solutionConclusionsProtection  Low-Cost Traffic Analysis of Tor  Locating Hidden Servers  Low-Resource Routing Attacks Against Tor  by Steven J. Murdoch and George Danezis.  In the Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005  by Lasse Øverlier and Paul Syverson.  In the Proceedings of the 2006 IEEE Symposium on Security and Privacy, May  by Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker.  In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, October 2007.

 To break the anonymity of the Tor user that accesses our server, using modest means. BackgroundProject’s goalOur solutionConclusionsProtection

 We don’t allow the user to access our server without a kind of a “handshake”,during which we break his anonymity.  Rationale: after an indication of user’s malicious behavior we want to detect who he is by breaking his anonymity. BackgroundProject’s goalOur solutionConclusionsProtection

 Assumptions:  Used Programs: BackgroundProject’s goalOur solutionConclusionsProtection  The Entry Node in the Tor circuit is compromised and under our control.  The Server is under our control  C# (first implementation of servers)  Python (simple implementation of servers)  WireShark (network activity tracing)  Etc.

 Our solution is based on analysis of browsing traffic between TOR client and server.  The analysis is done on TOR circuit’s Entry Node. BackgroundProject’s goalOur solutionConclusionsProtection

BackgroundProject’s goalOur solutionConclusionsProtection

 Time based approach BackgroundProject’s goalOur solutionConclusionsProtection The server responds to user's requests by intentionally delaying its response packets in a predetermined pattern.

BackgroundProject’s goalOur solutionConclusionsProtection  Time Sequence Pattern: {1.5, 3,2, 5}  About 83% matching.  False positive 25 times.

 HTTP Refresh based approach BackgroundProject’s goalOur solutionConclusionsProtection The server responds to user's requests with data containing an http meta refresh tag.

BackgroundProject’s goalOur solutionConclusionsProtection  Refresh Each 2 sec.  9 Times.  About 59% matching.  False positive 13 times

BackgroundProject’s goalOur solutionConclusionsProtection  According to received results we can see that the time sequence solution provides the best match rate. In order to increase it we need to research further in the following directions:  Dependency between the length and complexity of the time sequence and the match rate.  Influence of quality of connection on the match rate.  We can improve our results by using smart trace analysis (Heuristics, Machine Learning, Neural Networks Learning).

 Random small time delay in data transmission on each circuit’s node.  Integrated detection of time/ packet patterns.  Aggregation / breaking of data in bigger / smaller packets.  User side solution: don’t route a single session to a single server through a specific Tor circuit BackgroundProject’s goalOur solutionConclusionsProtection

 Proposed ways to break TOR user anonymity do not require significant computational or network overhead, but can provide useful results.  There is a room for improvement and refinement on our methods by working along aforementioned lines. BackgroundProject’s goalOur solutionConclusionsProtection

BackgroundProject’s goalOur solutionConclusionsProtection Questions?