Anonymous Communication

Slides:



Advertisements
Similar presentations
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Advertisements

CS 4700 / CS 5700 Network Fundamentals Lecture 22: Anonymous Communications (Wave Hi to the NSA)
Information Hiding: Anonymous Communication
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
CSCI 5234 Web Security1 Privacy & Anonymity in the WWW Ch. 12, Oppliger.
Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University.
Chapter 16 The World Wide Web Chapter Goals ( ) Compare and contrast the Internet and the World Wide Web Describe general Web processing.
Anonymous routing and mix nets (Tor) Yongdae Kim Significant fraction of these slides are borrowed from CS155 at Stanford 1.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
CS 3700 Networks and Distributed Systems Anonymous Communications (Wave Hi to the NSA) Revised 8/21/15.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
TCP/IP (Transmission Control Protocol / Internet Protocol)
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Introduction to Network Systems Security Mort Anvari.
1 Anonymous Communications CSE 5473: Network Security Lecture due to Prof. Dong Xuan Some material from Prof. Joan Feigenbaum.
K. Salah1 Security Protocols in the Internet IPSec.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Modified Onion Routing and its Proof of Concept By: Gyanranjan Hazarika.
Computer and Network Security
Web Applications Security Cryptography 1
Outline The basic authentication problem
Go to youtube and search “Code.org internet videos”
Original slides prepared by Theo Benson
anonymous routing and mix nets (Tor)
Application layer tcp/ip
COMPUTER NETWORKS CS610 Lecture-21 Hammad Khalid Khan.
CS590B/690B Detecting Network Interference (FALL 2016)
Network Security Mechanisms
Encryption and Network Security
Encryption 1-way String Encryption Rainbows (a.k.a. Spectrums)
HTTP and Abstraction on the Internet
Network Security.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Principles of Network Applications
Anonymous Communication
CONTRA Camouflage of Network Traffic to Resist Attack (Intrusion Tolerance Using Masking, Redundancy and Dispersion) DARPA OASIS PI Meeting – Hilton Head.
Protocols for Anonymous Communication
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Web Caching? Web Caching:.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Christo Wilson Revised 8/21/15
The University of Adelaide, School of Computer Science
Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
Computer Communication & Networks
0x1A Great Papers in Computer Security
Network Security: Anonymity
Free-route Mixes vs. Cascades
Anonymous Communication
Lecture 3: Secure Network Architecture
Anonymity (Privacy) Suppose you are surfing the Web.
Internet Basics Videos
Anonymity Modified from Christo Wilson, Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Securing the Anonymity of Content Providers in the World Wide Web
Peer-to-Peer Information Systems Week 7: Anonymity Part 2
Anonymity – Generalizing Mixes
Presentation transcript:

Anonymous Communication COS 518: Advanced Computer Systems Lecture 20 Michael Freedman Slides based heavily on Christo Wilson’s CS4700/5700 at Northeastern

Definition “Who you are” from the communicating party Hiding identities of parties involved in communications from each other, or from third-parties “Who you are” from the communicating party “Who you are talking to” from everyone else

Quantifying Anonymity How can we calculate how anonymous we are? Suspects (Anonymity Set) Who sent this message? Larger anonymity set = stronger anonymity

Anonymity Systems

Crypto (SSL) Content is unobservable Data Traffic Content is unobservable Due to encryption Source and destination are trivially linkable No anonymity!

Anonymizing Proxies No anonymity! Source is known Destination known HTTPS Proxy No anonymity! Source is known Destination anonymity Destination known Source anonymity

Anonymizing VPNs No anonymity! Source is known Destination known VPN Gateway No anonymity! Source is known Destination anonymity Destination known Source anonymity

Crowds

Crowds Key idea High-level implementation Users’ traffic blends into a crowd of users Eavesdroppers and end-hosts don’t know which user originated what traffic High-level implementation Every user runs a proxy on their system When a message is received, select x [0, 1] If x > pf: forward the message to a random proxy Else: deliver the message to the actual receiver

Crowds Example Links between users use public key crypto Users may appear on the path multiple times Final Destination

Anonymity in Crowds No source anonymity Target receives m (>= 0) msgs, sends m+1 msgs Thus, target is sending something Destination anonymity is maintained If the source isn’t sending directly to the receiver

Anonymity in Crowds Source and destination are anonymous Source and destination are proxies Destination is hidden by encryption

Anonymity in Crowds Destination known Source is anonymous O(n) possible sources, where n is the number of proxies

Anonymity in Crowds Destination is known Evil proxy able to decrypt the message Source is somewhat anonymous Suppose f evil in system and if pf > 0.5 and n > 3(f + 1), source cannot be inferred with prob > 0.5

Summary of Crowds The good: The bad: Crowds has excellent scalability Each user helps forward messages and handle load More users = better anonymity for everyone Strong source anonymity guarantees The bad: Very weak destination anonymity Evil proxies can always see the destination Weak unlinkability guarantees

MIXes

Mix Networks A different approach to anonymity than Crowds Originally designed for anonymous email David Chaum, 1981 Concept has since been generalized for TCP traffic Hugely influential ideas Onion routing Traffic mixing Dummy traffic (a.k.a. cover traffic)

Onion Routing Encrypted Tunnels Mix Non-encrypted data [KP , KP , KP] <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> Non-encrypted data E(KP , E(KP , E(KP , M))) = C Mixes form a cascade of anonymous proxies All traffic is protected with layers of encryption

Another View of Encrypted Paths <KP, KS> <KP, KS> <KP, KS>

Return Traffic In a mix network, how can the destination respond to the sender? During path establishment, the sender places keys at each mix along the path Data is re-encrypted as it travels the reverse path <KP1 , KS1> KP1 KP2 KP3 <KP2 , KS2> <KP3 , KS3>

Traffic Mixing Hinders timing attacks Problems: 1 1 4 2 2 3 3 4 Mix collects msgs for t seconds Messages are randomly shuffled and sent in a different order Hinders timing attacks Messages may be artificially delayed Temporal correlation is warped Problems: Requires lots of traffic Adds latency to network flows Arrival Order Send Order 1 1 4 2 2 3 3 4

Applied to cryptographic voting Server collects votes Computes random shuffle of votes Outputs votes in randomized order Includes “proof” that correctly shuffled Arrival Order Send Order 1 1 4 2 2 3 3 4

Chain multiple MIXes for security Synchronously collects and shuffles messages (votes) Secure as long as at least 1 honest Arrival Order Send Order 1 1 4 2 2 3 3 4 Random shuffle Random shuffle Random shuffle

Dummy / Cover Traffic Simple idea: Send useless traffic to help obfuscate real traffic

In practice Hard to be anonymous Information leaked at many layers

Using Content to Deanonymize HTTPS Proxy Login to email account Information sent in cookies Accessing Facebook pages No anonymity!

It’s Hard to be Anonymous! Network location (IP address) can be linked directly to you ISPs store communications records (legally required for several years) Law enforcement can subpoena these records Application is being tracked Cookies, Flash cookies, E-Tags, HTML5 Storage, browser fingerprinting Centralized services like Skype, Google voice Activities can be used to identify you Unique websites and apps that you use, types of clicked links Types of links that you click

You Have to Protect at All Layers! Challenges: Maintain performance Provide functionality!