Phillipa Gill University of Toronto

Slides:



Advertisements
Similar presentations
Pune, India, 13 – 15 December 2010 ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services Dr. Bamba Gueye Joint work.
Advertisements

Dude, where’s that IP? Circumventing measurement-based IP geolocation Presented by: Steven Zittrower.
Understanding Geolocation Accuracy using Network Geometry Brian Eriksson Technicolor Palo Alto Mark Crovella Boston University.
Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Intel Research Internet Coordinate Systems - 03/03/2004 Internet Coordinate Systems Marcelo Pias Intel Research Cambridge
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Phillipa Gill, Yashar Ganijali Dept. of CS University of Toronto Bernard Wong Dept. of CS Cornell University David Lie Dept. of Electrical and Computer.
Fabián E. Bustamante, 2007 Meridian: A lightweight network location service without virtual coordinates B. Wong, A. Slivkins and E. Gün Sirer SIGCOM 2005.
On the Hardness of Evading Combinations of Linear Classifiers Daniel Lowd University of Oregon Joint work with David Stevens.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Geolocation Les Cottrell – SLAC University of Helwan / Egypt, Sept 18 – Oct 3, 2010 Partially funded by DOE/MICS Field Work Proposal on Internet End-to-end.
Loss and Delay Accountability for the Internet by Presented by:Eric Chan Kai Chen.
A Detailed Path-latency Model for Router Geolocation Sándor Laki *, Péter Mátray, Péter Hága, István Csabai and Gábor Vattay Department of Physics of Complex.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks Locations.
 Zhichun Li  The Robust and Secure Systems group at NEC Research Labs  Northwestern University  Tsinghua University 2.
(jeez y) Where is the Internet? Answers from : (G. Whilikers) Out there. (Mike) the way I see it, the "internet" has to be somewhere. a router collects.
PingER: Research Opportunities and Trends R. Les Cottrell, SLAC University of Malaya.
Ao-Jan Su, David R. Choffnes, Fabián E. Bustamante and Aleksandar Kuzmanovic Department of EECS Northwestern University Relative Network Positioning via.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Towards Street-Level Client- Independent IP Geolocation Yong Wang, UESTC/Northwestern Daniel Burgener, Northwestern Marcel Flores, Northwestern Aleksandar.
University of Central Florida CAP 6135: Malware and Software Vulnerability Spring 2012 Paper Presentation Dude, where’s that IP? Circumventing measurement-based.
1 Min-Cost Live Webcast under Joint Pricing of Data, Congestion and Virtualized Servers Rui Zhu 1, Di Niu1, Baochun Li 2 1 Department of Electrical and.
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
Streaming over Subscription Overlay Networks Department of Computer Science Iowa State University.
TDTS21: Advanced Networking Lecture 7: Internet topology Based on slides from P. Gill and D. Choffnes Revised 2015 by N. Carlsson.
Live Streaming over Subscription Overlay Networks CS587x Lecture Department of Computer Science Iowa State University.
1 Passive Network Tomography Using Bayesian Inference Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang Microsoft Research Internet Measurement.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Elastic Pathing: Your Speed Is Enough to Track You Presented by Ali.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Locating hosts by TULIP (Trilateration Utility for Locating IP hosts) Prepared by: Les Cottrell SLAC, Faran Javed NIIT, Shahryar Khan NIIT,Umar Kalim NIIT.
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
Determining the Geographic Location of Internet Hosts Venkata N. Padmanabhan Microsoft Research Lakshminarayanan Subramanian University of California at.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
WSP: A Network Coordinate based Web Service Positioning Framework for Response Time Prediction Jieming Zhu, Yu Kang, Zibin Zheng and Michael R. Lyu The.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
A Detailed Path-latency Model for Router Geolocation* Internetes hosztok mérés alapú geolokalizációja Sándor Laki, Péter Mátray, Péter Hága, István Csabai.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Anycast enumeration and geolocation approaches Scuola Politecnica e delle Scienze di Base Corso di Laurea Magistrale in Ingegneria Informatica master’s.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Spam detection using IP geolocation O-talk Andriy Stetsko.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Lecture 13 – Network Mapping
A Location-Based Routing Method for Mobile Ad Hoc Networks
Vivaldi: A Decentralized Network Coordinate System
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Packet Leashes: Defense Against Wormhole Attacks
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Presented by Prashant Duhoon
563.10: Bloom Cookies Web Search Personalization without User Tracking
Dieudo Mulamba November 2017
Dude, where’s that IP? Circumventing measurement-based geolocation
RandPing: A Randomized Algorithm for IP Mapping
Chandrika Jayant Ethan Katz-Bassett
Efficient Evaluation of k-NN Queries Using Spatial Mashups
CS590B/690B Detecting network interference (Spring 2018)
Data Link Layer 2019/2/19.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Provable Security at Implementation-level
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
No-Jump-into-Latency in China's Internet
Presentation transcript:

Phillipa Gill University of Toronto Dude, where’s that IP? Circumventing measurement-based geolocation Phillipa Gill University of Toronto Yashar Ganjali & David Lie University of Toronto Bernard Wong Cornell University

Geolocation applications: Custom content Local search results Targeted advertisements 11/18/2018 P. Gill - University of Toronto

Geolocation applications: Access control 11/18/2018 P. Gill - University of Toronto

Geolocation applications: Fraud prevention Proof of work [Kaiser and Feng 2010] Clients forced to solve computational puzzles, Hardness of puzzle based on distance Online payment fraud Use location to flag suspicious transactions 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Behind the scenes Web server HTTP GET [128.197.11.23] Deny access User (Boston, MA) 128.197.11.23 ?? Boston, MA USA 02116 128.197.11.23 Geolocation Database 11/18/2018 P. Gill - University of Toronto

Future application of geolocation Enforcing regional restrictions in cloud computing Use geolocation to locate virtual machines 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Motivation Targets have incentive to lie Content providers: Restrict access to content Prevent fraud Cloud computing users: Need the ability to guarantee the result of geolocation 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Our contributions First to consider measurement-based geolocation of an adversary Two models of adversarial geolocation targets Web client (end host) Cloud provider (network) Evaluation of attacks on delay and topology-based geolocation. 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Road map Motivation & Contributions Background Adversary models Evaluation Conclusions Ongoing/Future work 11/18/2018 P. Gill - University of Toronto

Geolocation background Databases/passive approaches whois services Commercial databases Quova, MaxMind, etc. Drawbacks: coarse-grained slow to update proxies 11/18/2018 P. Gill - University of Toronto

Coarse grained geolocation traceroute to 74.125.229.18 (Google) 1 80.82.140.226 0.209 ms 0.129 ms 0.328 ms 2 80.82.140.42 0.539 ms 0.525 ms 0.498 ms 3 80.82.140.43 0.472 ms 0.451 ms 0.427 ms 4 195.66.226.125 1.066 ms 1.077 ms 1.075 ms 5 209.85.252.76 1.022 ms 0.943 ms 0.979 ms 6 216.239.43.192 76.558 ms 76.454 ms 75.900 ms 7 209.85.251.9 91.356 ms 93.749 ms 93.941 ms 8 64.233.175.34 92.907 ms 93.624 ms 94.090 ms 9 74.125.229.18 93.307 ms 93.389 ms 90.771 ms LINX(UK) Google (USA?) Delay difference between LINX and google implies google IP is not in the us! 11/18/2018 P. Gill - University of Toronto

Coarse grained geolocation traceroute to 74.125.229.18 (Google) 1 80.82.140.226 0.209 ms 0.129 ms 0.328 ms 2 80.82.140.42 0.539 ms 0.525 ms 0.498 ms 3 80.82.140.43 0.472 ms 0.451 ms 0.427 ms 4 195.66.226.125 1.066 ms 1.077 ms 1.075 ms 5 209.85.252.76 1.022 ms 0.943 ms 0.979 ms 6 216.239.43.192 76.558 ms 76.454 ms 75.900 ms 7 209.85.251.9 91.356 ms 93.749 ms 93.941 ms 8 64.233.175.34 92.907 ms 93.624 ms 94.090 ms 9 74.125.229.18 93.307 ms 93.389 ms 90.771 ms LINX(UK) Google (USA?) 11/18/2018 P. Gill - University of Toronto

Delay-based geolocation Example: Constraint-based geolocation [Gueye et al. ToN ‘06] Ping other landmarks to calibrate Distance-delay “best-line” function Ping! Ping! Ping! 11/18/2018 P. Gill - University of Toronto

Delay-based geolocation Example Constraint-based geolocation [Gueye et al. ToN ‘06] 2. Ping target Ping! Ping! Ping! Ping! 11/18/2018 P. Gill - University of Toronto

Delay-based geolocation Example Constraint-based geolocation [Gueye et al. ToN ‘06] 3. Map delay to distance from target 4. Constrain target location 11/18/2018 P. Gill - University of Toronto

Topology-aware geolocation Delay-based geolocation assumes direct paths “as the crow flies” Ping! Ping! reality 11/18/2018 P. Gill - University of Toronto

Topology-aware geolocation Takes into account circuitous network paths 11/18/2018 P. Gill - University of Toronto

Types of measurement-based geolocation: Delay-based: Constraint-based geolocation (CBG) [Gueye et al. ToN ‘06] Computes region where target may be located Reported average accuracy: 78-182 km Topology-aware: Octant [Wong et al. NSDI 2007] Considers delay between hops on path Geolocates nodes along the path Reported median accuracy: 35-40 km 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Road map Motivation & Contributions Background Adversary models Evaluation Conclusions Future work 11/18/2018 P. Gill - University of Toronto

Simple adversary (e.g., Web client) Knows the geolocation algorithm Able to delay their response to probes i.e., increase observed delays Cannot decrease delay Landmark i 11/18/2018 P. Gill - University of Toronto

Sophisticated adversary (e.g., Cloud provider) Controls the network the target is located in Network has multiple geographically distributed entry points Adversary constructs network paths to mislead topology-aware geolocation tar target 11/18/2018 landmark

P. Gill - University of Toronto Road map Motivation & Contributions Background Adversary models Evaluation Conclusions Future work 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Evaluation Questions: How accurately can an adversary mislead geolocation? Can they be detected? Error for the adversary Geolocation result True location False location Distance of attempted move 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Methodology Collected traceroutes between 50 PlanetLab nodes Each node takes turn as target Each target moved to a set of forged locations Landmarks Forged Locations 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Results overview Adversary Type Simple Sophisticated Delay-based Topology-aware Geolocation method 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Results overview Adversary Type Simple Sophisticated Delay-based Topology-aware ? ? Geolocation method 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Delay adding attack Increase delay by time to travel g2-g1 Challenge: how to map distance to delay Our attack: V1: Speed of light approximation V2: Adversary knows “best-line” function Note this does not work if g2 < g1 g2 False location g1 True location 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Delay-adding attack Landmark 1 Landmark 3 Landmark 2 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Delay-adding attack Landmark 1 Landmark 3 Landmark 2 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Can it be detected? Area of intersection increases as delay is added Abnormally large region sizes can reveal results that have been tampered with 11/18/2018 P. Gill - University of Toronto

How accurate can the attack be? 700 M/KM NYC-SFO 400 M/KM Trade off between accuracy and detectability 11/18/2018 P. Gill - University of Toronto

Detectable using region size Results overview Adversary Type Simple Sophisticated Delay-based Topology-aware Limited Accuracy Detectable using region size Geolocation method ? 11/18/2018 P. Gill - University of Toronto

Adding delay to topology-aware geolocation Landmark 1 add delay Landmark 1 Landmark 2 add delay Landmark 2 11/18/2018 P. Gill - University of Toronto

Adding delay to topology-aware geolocation Landmark 1 add delay Detectable! Landmark 1 Landmark 2 add delay Landmark 2 11/18/2018 P. Gill - University of Toronto

Detectable using region size Results overview Adversary Type Simple Sophisticated Delay-based Topology-aware Limited Accuracy Detectable using region size Geolocation method ? 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Hop-adding attack Sophisticated adversary Can alter traceroute paths after they enter the adversary’s network Has a WAN with multiple entry points Challenge: how to design the non-existent paths Our attack: Leverage existing network entry points Use a non-existent (simulated) network to generate fake paths 11/18/2018 P. Gill - University of Toronto

Hop-adding attack: Simulated network Multiple network entry points In-degree 3 for each node Fake node next to each forged location 11/18/2018 P. Gill - University of Toronto

How accurate can the attack be? Adversary can move from EU to US 100% of the time. NYC-SFO Even moving long distances sophisticated adversary has high accuracy 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Can it be detected? Region size does not increase Hop adding is able to mislead the algorithm without increasing region size! 11/18/2018 P. Gill - University of Toronto

Detectable using region size Results overview Adversary Type Simple Sophisticated Delay-based Topology-aware Limited Accuracy Detectable using region size Geolocation method High accuracy Difficult to detect 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Road map Motivation Background Adversary models Evaluation Conclusions Future work 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Conclusions Current geolocation approaches are susceptible to malicious targets Databases misled by proxies Measurement-based geolocation by attacks on delay and topology measurements Developed and evaluated adversary models for measurement-based geolocation techniques Topology-aware geolocation better in benign case, worse in adversarial setting! 11/18/2018 P. Gill - University of Toronto

P. Gill - University of Toronto Future work Develop a framework for secure geolocation Require the adversary to prove they are in the correct location Goals: Provable security: Upper bound on what an adversary can get away with. Practical framework: Should be tolerant of variations in network delay 11/18/2018 P. Gill - University of Toronto

Paper appears in: Usenix Security 2010 Thanks! Paper appears in: Usenix Security 2010 http://www.cs.toronto.edu/~phillipa Contact: phillipa@cs.toronto.edu 11/18/2018 P. Gill - University of Toronto