Strengthening Tor against Eavesdropping Correlation Attacks Robert Thomas CSCE 727 20 APR 2015 Audio: https://drive.google.com/file/d/0Bwz32a1PN_QuWFN5TVJ1WWprb0k/view?usp=sharinghttps://drive.google.com/file/d/0Bwz32a1PN_QuWFN5TVJ1WWprb0k/view?usp=sharin

Slides:



Advertisements
Similar presentations
Tor: The Second-Generation Onion Router
Advertisements

LASTor: A Low-Latency AS-Aware Tor Client
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
Detectability of Traffic Anomalies in Two Adjacent Networks Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot.
Trust-based Anonymous Communication: Models and Routing Algorithms Aaron Johnson Paul Syverson Roger Dingledine Nick Mathewson U.S. Naval Research Laboratory.
Onion Routing Security Analysis Aaron Johnson U.S. Naval Research Laboratory DC-Area Anonymity, Privacy, and Security Seminar.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
COEN 252: Computer Forensics Router Investigation.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
The Anonymous File Transfer Network
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
NoAH Spiros Antonatos Distributed Computing Systems Lab (DCS) Institute of Computer Science.
Who am I? Mats Ohlin Swedish Defence Materiel Administration (FMV) IT Security area –International Standardisation: ISO/IEC JTC 1/SC 27/WG 3 (Security.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Anonymity on the Internet Presented by Randy Unger.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Chapter 9 Cisco IOS Firewall. IOS Firewall  Stateful packet-filter firewall that runs on a router  Provides firewall capabilities and normal routing.
Guard Sets for Onion Routing JOSHUA FREE. Tor Most popular low-latency distributed anonymity network Controversial decisions of guard selection strategies.
METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/ metadata Camera/image metadata Web browser identification.
Routing Around Decoys Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper Proposed in FOCI'11, USINIX Security'11 and CCS'11 Presented by:
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
1 Distributed Monitoring CERNET's experience Xing Li
The Silk Road: An Online Marketplace
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
NC STATE UNIVERSITY / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Fengmin Gong Talk:
LASTor: A Low-Latency AS-Aware Tor Client. Tor  Stands for The Onion Router  Goals: Anonymity ○ Each hop only knows previous and next hop on a path.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Observation vs. Inferences The Local Environment.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum
Security Issues With Mobile IP
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (FALL 2016)
The Onion Router Hao-Lun Hsu
Moritz Bartl
Outline Basics of network security Definitions Sample attacks
Exercise ?: TOR.
Privacy Through Anonymous Connection and Browsing
0x1A Great Papers in Computer Security
Anupam Das , Nikita Borisov
ارائه دهنده : رضا دادآفرين مرداد ماه 1389
Free-route Mixes vs. Cascades
Anonymity - Background
Alex Guy packets (stars) tor routers users web servers (squares)
Anonymous Communication
Privacy Privacy vs. security? Data privacy issues
Anonymous Communication
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Strengthening Tor against Eavesdropping Correlation Attacks Robert Thomas CSCE APR 2015 Audio:

Tor What is it? Network of Onion Routers Anonymity Tool Why should you care? Anonymity == Privacy “Big Brother is watching” 2

Eavesdropping Correlation Attack Observe enough data to statistically infer origin and destination Compromises anonymity Passive Variants Only listen Hard to detect Active Variants Misreport capabilities to attract users to observable nodes Denial of Service on unobservable nodes 3

Anonymity vs Performance 4 Related Work General Operate your own node (impacts performance) Cover traffic (impacts performance) Passive Tools to detect ‘odd’ nodes (impacts performance) Obscure routing strategies (impacts performance) Active Bandwidth Verification of potential nodes (only avoids nodes misreporting capabilities) Increased Anonymity protections cost Performance (usually)

This Project Provides the Best of Both! Combine individual solutions Bandwidth Verification Operate a Node Cover traffic Cover_traffic = MIN(Sender_available_capacity, Receiver_available_capacity) – (Payload + Buffer_allowance) Experiment Results will validate claims Anonymity measured by dataset size needed for successful correlation attack Performance measured by load test 5