Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Advertisements

CMPE208 Presentation Terminal Access Controller Access Control System Plus (TACACS+) By MARVEL (Libing, Bhavana, Ramya, Maggie, Nitin)
Hidden Markov Model Cryptanalysis Chris Karlof and David Wagner.
Service Discrimination and Audit File Reduction for Effective Intrusion Detection by Fernando Godínez (ITESM) In collaboration with Dieter Hutter (DFKI)
Password Authentication Using Hopfield Neural Networks Shouhong Wang; Hai Wang Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
1 Chapter 5 Hashes and Message Digests Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
Exploring timing based side channel attacks against i CCMP Suman Jana, Sneha K. Kasera University of Utah Introduction
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Toward a Framework for Preventing Side-Channel Attacks in Wireless Networks Jeff Pang.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Keystroke Dynamics Jarmo Ilonen. Structure of presentation Introduction Keystroke dynamics for Verification Identification Commercial system: BioPassword.
Key-Stroke Timing and Timing Attack on SSH Yonit Shabtai and Michael Lustig supervisor: Yoram Yihyie Technion - Israel Institute of Technology Computer.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
SSH Secure Login Connections over the Internet
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Session 1341: Case Studies of Security Studies of Intrusion.
WEP Protocol Weaknesses and Vulnerabilities
BASIC INTERNET PROTOCOLS: http, ftp, telnet. Mirela Walczak.
Chapter 7 – Confidentiality Using Symmetric Encryption.
CHAPTER 9 Sniffing.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems USENIX 2009 Kehuan Zhang, Indiana University, Bloomington XiaoFeng Wang,
- Gene Spafford, Purdue "Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit-card information from.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Lecture 2: Introduction to Cryptography
Exploiting Cache-Timing in AES: Attacks and Countermeasures Ivo Pooters March 17, 2008 Seminar Information Security Technology.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Doc.: IEEE /211r0-Michael-Attacks-And-Countermeasures Submission March 2003 Dan Harkins, Trapeze Networks.Slide 1 Attacks against Michael and.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Queuing Delay 1. Access Delay Some protocols require a sender to “gain access” to the channel –The channel is shared and some time is used trying to determine.
Mapping Internet Sensor With Probe Response Attacks Authors: John Bethencourt, Jason Franklin, and Mary Vernon. University of Wisconsin, Madison. Usenix.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
By Jyh-haw Yeh Department of Computer Science Boise State University.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Sanmit Narvekar Department of Computer Science California State University, Los Angeles Advisor: Prof. Valentino Crespi.
1 Example security systems n Kerberos n Secure shell.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Module 4 Remote Login.
Cryptography Lecture 4.
Timing Analysis of Keystrokes and Timing Attacks on SSH
Timing Analysis of Keystrokes And Timing Attacks on SSH
Computer Security Protection in general purpose Operating Systems
Cryptography Lecture 3.
Presentation transcript:

Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner, Xuqing Tian Publish: Usenix Security Symposium 2001 Presented by: Hua Zhang

Presentation for CDA6938 Network Security, Spring 2006 Contributions Show that minor weaknesses of SSH can leak significant information Propose a way to infer key sequences from inter- keystroke timing Implement a real attack system Propose countermeasures for the attack

Presentation for CDA6938 Network Security, Spring 2006 Outline Introduction Weakness of SSH Eavesdropping SSH Analysis of Inter-keystroke Timing Inferring Character Sequences Herbivore Password Inference for Multiple Users Conclusion

Presentation for CDA6938 Network Security, Spring 2006 Introduction Telnet, rlogin, ftp –Pass all information without encryption –In broadcast-based networks (e.g. Ethernet), attacker can eavesdrop the network to get all communicated information SSH (Secure Shell) –Offer an encrypted channel between the host and the server –Authentication of host and server

Presentation for CDA6938 Network Security, Spring 2006 Introduction

Presentation for CDA6938 Network Security, Spring 2006 Weakness of SSH Packets are padded only to an eight-byte boundary when a block cipher is in use –Attacker can estimate the approximate length of the original data Every keystrokes is sent immediately in a separate packet –Attacker can learn the exact length of user’s passwords –And the precise inter-keystroke timing, which can be used to crack the password

Presentation for CDA6938 Network Security, Spring 2006 Eavesdropping SSH ‘su’ is the Unix command to switch to the root user The pattern forms a signature Attacker can get –Exact length of the password –Precise inter-keystroke timings of the password

Presentation for CDA6938 Network Security, Spring 2006 Nested SSH Attack User SSH to B, then SSH to C –E.g. if C can only be accessed through B Password characters are passed separately to B, then as one packet to C –Attacker can get exact length of password and inter-stroke timing

Presentation for CDA6938 Network Security, Spring 2006 Analysis of Inter-keystroke Timing Data Collection –Not possible to gather real passwords due to security and priority reasons –Approach 1: pick a random password and ask a user to type Not necessary as only key pairs are needed People tends to type passwords in group of 3-4 characters, which distorts the statistics –Approach 2: pick key pairs for user to type

Presentation for CDA6938 Network Security, Spring 2006 Analysis of Inter-keystroke Timing Data are collected by asking users to type key pairs Key pair ‘v-o’ takes much less time then key pair ‘v-b’ There are almost non- overlapping

Presentation for CDA6938 Network Security, Spring 2006 Analysis of Inter-Keystroke Timing

Presentation for CDA6938 Network Security, Spring 2006 Analysis of Inter-Keystroke Timing The latency between the two key strokes of a given key pair forms a Gaussian-like distribution Estimated information gain available from latency information is about 1.2 bits per characteristic pair - significant compared to the bits per character entropy of written English

Presentation for CDA6938 Network Security, Spring 2006 Inferring Character Sequences Hidden Markov Model –The output, y, is only determined by the current state –Widely used in areas such as speech reorganization N-Viterbi Algorithm –Given y, the sequence of latencies, try to infer the real character sequence –Calculate the possibility that a sequence will yield the output y

Presentation for CDA6938 Network Security, Spring 2006 Inferring Character Sequences The graph shows the probability that the real character pair appears within the n most-likely character paris Using the middle curve –Success rate is 90% when n=70

Presentation for CDA6938 Network Security, Spring 2006 Herbivore Targeted for nested-SSH Herbivore –Wait for packets correspond to passwords –Measures the inter-arrival times –Using n-Viterbi algorithm to generate list of candidate passwords

Presentation for CDA6938 Network Security, Spring 2006 Herbivore Percentage of the password space tried by Herbivore –On average, only needs to test 1/50 times as many passwords as brute-force search Problem –Herbivore is trained by the frequencies of the user at first, which is not feasible in reality

Presentation for CDA6938 Network Security, Spring 2006 Password Inference for Multiple Users Observations –Inferring is more effectively if trained by the same user –Distances between the typing statistics of two users can vary significantly –Inferring can still be used without training data from the user

Presentation for CDA6938 Network Security, Spring 2006 Countermeasures Send dummy packets when users are typing password –Signature attack will fail –Inter-keystroke timing information is still available to the user For every keystroke, delay random time before sending out the packet –Randomize the timing information of the keystrokes –Won’t work if the attacker can monitor the user login many times and compute the average of the latencies Send packets at constant rate

Presentation for CDA6938 Network Security, Spring 2006 Conclusion Strong Points –A lot of experiment results to support the proposed ideas –Implement Herbivore Weak Points –Assuming that people have similar typing statistics –Data collected by typing key pairs, people may type differently when typing passwords –Herbivore only works for nested-SSH

Presentation for CDA6938 Network Security, Spring 2006 Questions?