Tor and Timing Attacks An attack within the accepted attacker model.

Slides:



Advertisements
Similar presentations
SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
Advertisements

Tor: The Second-Generation Onion Router
LASTor: A Low-Latency AS-Aware Tor Client
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Tor – The Onion Router By: David Rollé. What is Tor?  Second generation Onion Routing  Aims to improve on first generation issues  Perfect Forward.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
Slicing the Onion: Anonymous Routing without PKI Saurabh Shrivastava CS 259
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
Cashmere: Resilient Anonymous Routing CS290F March 7, 2005.
1 Modeling and Analysis of Anonymous-Communication Systems Joan Feigenbaum WITS’08; Princeton NJ; June 18, 2008 Acknowledgement:
Loss and Delay Accountability for the Internet by Presented by:Eric Chan Kai Chen.
1 Network Tomography Venkat Padmanabhan Lili Qiu MSR Tab Meeting 22 Oct 2001.
Positive Feedback Loops in DHTs or Be Careful How You Simulate January 13, 2004 Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz From “Handling.
A Usability Evaluation of the Tor Anonymity Network By Gregory Norcie.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
RCS: A Rate Control Scheme for Real-Time Traffic in Networks with High B X Delay and High error rates J. Tang et al, Infocom 2001 Another streaming control.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Stealth Probing: Efficient Data- Plane Security for IP Routing Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Toward Understanding Congestion in Tor DC-area Anonymity, Privacy, and Security Seminar January 24 th, 2014 Rob Jansen U.S. Naval Research Laboratory *Joint.
Towards an Analysis of Onion Routing Security Syverson, Tsudik, Reed, and Landwehr PET 2000 Presented by: Adam Lee 1/26/2006 Syverson, Tsudik, Reed, and.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Data Communications and Networking
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, : Adv. Network Security.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Vikramaditya. What is a Sensor Network?  Sensor networks mainly constitute of inexpensive sensors densely deployed for data collection from the field.
September 27, Instabilities and Oscillations in Networks of Queues Matthew Andrews Bell Labs Joint work with Alex Slivkins (Cornell)
NECP: the Network Element Control Protocol IETF WREC Working Group November 11, 1999.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
 Protocols used by network systems are not effective to distributed system  Special requirements are needed here.  They are in cases of: Transparency.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Lecture 14: Anonymity on the Web (cont) Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Computer Networks with Internet Technology William Stallings
Chapter 5: Implementing Intrusion Prevention
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Traffic Analysis: Network Flow Watermarking Amir Houmansadr CS660: Advanced Information Assurance Spring CS660 - Advanced Information Assurance.
Jordan Howell Frank Geiger. Table of Contents  Question  Overview of example  Packets  OSI Model  Network Layer  Data Link Layer  Physical Layer.
COMMON CHANNEL SIGNALING (CCS#7)
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
The Silk Road: An Online Marketplace
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Confidentiality using Conventional Encryption Chapter 5.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Tor Bruce Maggs relying on materials from
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Anonymous Communication
0x1A Great Papers in Computer Security
Data Communication and Computer Networks
Anonymous Communication
Bruce Maggs relying on materials from
Anonymous Communication
Anonymous Communication
Bruce Maggs relying on materials from
Presentation transcript:

Tor and Timing Attacks An attack within the accepted attacker model

Onion Routing 2 –A real system for users Only true antecedent was ZKS’s Freedom Network –A variety of system enhancements PFS, congestion control, directory servers, etc.

Onion Routing Initiator-chosen paths −Instead of flipping a coin, the Initiator chooses the entire path and builds an onion. I  X  Y  Z  R −Layered encryption of data using the public key of each proxy in the path. data{R,data} Kz+ {Z,{R,data} Kz+ } Ky+ {Y,{Z,{R,data} Kz+ } Ky+ } Kx+ Sending the onion I  X: {Y,{Z,{R,data} Kz+ } Ky+ } Kx+ X  Y: {Z,{R,data} Kz+ } Ky+ Y  Z: {R,data} Kz+ Z  R: data

Tor Goals Deployability –Cannot be too expensive –Cannot be too troublesome or risky –Cannot require websites to run something different Usability Flexibility (& Good Specs) Simple Design

Attack Model What is the Tor Attack Model? Why is the model important?

Timing Attacks Timings say if they’re on the same path “Firstness” & “Lastness” can be determined –Why? A1DeltaA2 3:12:203:12:30 3:12:373:12:47 3:12:493:12:59 I A1 R A2 X 17 ms 12 ms Y

A Timing Attack Danezis 2004 Model: Global Passive Eavesdropper Idea –Gather timings of packets at all end points (entry and exit points) –Given a set of entry timings, produce a model of the exit timings. Look for a match. Result: Attacker obtains many correct matches

Another Timing Attack Levine, et al., 2004 Model: Substantial % of Tor servers (e.g. 10%) –Passive, in a sense Idea –See 2 slides ago –Handle errors gracefully –Repeat for many rounds Result: Attacker can get many good matches over time

A Note On the Tor Paper A Gold Mine! –28 different attacks –15 Open Questions –9 Future Directions Problem Selection –Is it interesting? –How hard a question? –Rough guesses?

Low-Cost Traffic Analysis of Tor Murdoch & Danezis, Oakland ‘05 A novel attack –within Tor’s attack model Key features under attack –Low-latency communication –Ease of entry & ability to use the system

M&D Attack Model What is it? How does it compare to prior models we have discussed? Is it realistic? Can it be stopped?

The Attack Setup T1T2T3 Resp. Init. A

The Attack Idea Tor uses Round Robin sending –each stream gets a turn –If a stream has no packets, it gets skipped Imagine node T2 has just two streams –A and Initiator –A is always on –What happens when Initiator sends a pkt?

Testing the Attack Set up a “victim” Set up the attack server Probes Correlation?

Results Some success –Usually higher correlation w/ pattern Limits –Some failure –Not clear where to set a dividing line Enhancements Possible

Defenses Cover traffic –Just filling the links is no good –Lots of traffic required? Delay –perfect interference –non-interference