Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.

Slides:



Advertisements
Similar presentations
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Advertisements

1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Chapter 17 Controls and Security Measures
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Peer-to-Peer Computing
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Computer Science Public Key Management Lecture 5.
Public Key Model 8. Cryptography part 2.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Identity A legal perspective FIDIS WP2 workshop 2/3 december 2003
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
ICT and Acedemia Christian Christensen Professor of Journalism Stockholm University, Sweden.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Who am I? Mats Ohlin Swedish Defence Materiel Administration (FMV) IT Security area –International Standardisation: ISO/IEC JTC 1/SC 27/WG 3 (Security.
Anonymity and the Internet Nathan Owens. Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
CSC8320. Outline Content from the book Recent Work Future Work.
Anonymity on the Internet Presented by Randy Unger.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Denial-of-Service Flooding Detection in Anonymity Networks Computer Networks & Communications Group Institute for IT-Security and Security Law University.
Cryptography and Network Security (CS435) Part Eight (Key Management)
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Peer-to-Peer Networks 16 P2P in the Wild Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Peer-to-Peer Networks 16 P2P in the Wild Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Fall 2006CS 395: Computer Security1 Key Management.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Peer-to-Peer Networks 10 Fast Download Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Peer-to-Peer Networks 10 Fast Download Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Threats Relating to Transport Layer Protocols Handling Multiple Addresses Masataka Ohta Tokyo Institute of technology
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
e-Health Platform End 2 End encryption
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
Presentation transcript:

Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Motivation for Anonymity  Society -Free speech is only possible if the speaker does not suffer negative consequences -Thus, only an anonymous speaker has truly free speech  Copyright infringement -Copying items is the best (and most) a computer can do -Copyright laws restrict copying -Users of file sharing systems do not want to be penalized for their participation or behavior  Dictatorships -A prerequisite for any oppressing system is the control of information and opinions -Authors, journalists, civil rights activists like all citizens should be able to openly publish documents without the fear of penalty  Democracies -Even in many democratic states certain statements or documents are illegitimate, e.g. (anti-) religious statements insults (against the royalty) certain types of sexual contents political statements (e.g. for fascism, communism, separation, revolution)  A anonymizing P2P network should secure the privacy and anonymity of each user without endangering other users 2

Terms  From -Danezis, Diaz, A Survey of Anonymous Communication Channels -Pfitzmann, Hansen, Anonymity, Unobservability and Pseudonymity – A Proposal for Terminology  Anonymity (Pfitzmann-Hansen 2001) -describes the state of being not identifiable within a larger set of subjects (peers), i.e. the anonymity set -The anonymity set can be all peers of a peer-to-peer network yet can be another (smaller or larger) set 3

Terms  Unlinkability -Absolute (ISO15408) „ensures that a user may make multiple uses of resources or services without other being able to link these uses together.“ -Relative Any attacker cannot find out more about the connections of the uses by observing the system -a-priori knowledge = a-posteriori knowledge 4

Terms  Unobservability -The items of interests are protected -The use or non-use of any service cannot be detected by an observer (attacker)  Pseudonymity -is the use of pseudonyms as IDs -preserves accountability and trustability while preserving anonymity 5

Attacks  Denial-of-Service Attacks (DoS) -or distributed denial of service attacks (DDoS) -one or many peers ask for a document -peers are slowed down or blocked completely  Sybil Attacks -one attacker produces many fake peers under new IP addresses -or the attacker controls a bot-net  Use of protocol weaknesses  Infiltration by malign peers -Byzantine Generals 6

Attacks  Timing attacks -messages are slowed down -communication line is slowed down -a connection between sender and receiver can be established  Poisoning Attacks -provide false information -wrong routing tables, wrong index files etc.  Eclipse Attack -attack the environment of a peer -disconnect the peer -build a fake environment  Surveillance -full or partial 7

Cryptography in a Nutshelf  Symmetric Cryptography -AES -Affine Cryptosystems  Public-Key Cryptography -RSA -ElGamal  Digital Signatures  Public-Key-Exchange -Diffie-Hellman  Interactive Proof Systems Zero-Knowledge-Proofs Secret Sharing Secure Multi-Party Computation 8