Active Protocols for Agile Censor-Resistant Networks Robert Ricci Jay Lepreau University of Utah May 22, 2001.

Slides:



Advertisements
Similar presentations
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Advertisements

Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Freenet A Distributed Anonymous Information Storage and Retrieval System Ian Clarke Oskar Sandberg Brandon Wiley Theodore W.Hong.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Janos Project: FY 2001 Jay Lepreau Flux Research Group University of Utah June 5, 2001.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
Anonymization and Privacy Services Infranet: Circumventing Web Censorship and Surveillance, Feamster et al, Usenix Security Symposium 2002.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Tarzan: A Peer-to-Peer Anonymizing Network Layer Michael J. Freedman, NYU Robert Morris, MIT ACM CCS 2002
Web server security Dr Jim Briggs WEBP security1.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Tracking and Tracing Cyber-Attacks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Ian Clarke, Oskar Sandberg, Brandon Wiley,Theodore W. Hong Presented by Zhengxiang.
Freenet File sharing for a political world. Freenet: A Distributed Anonymous Information Storage and Retrieval System I. Clarke, O. Sandberg, B. Wiley,
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
1 Panel Presentation: (Future) Practices for Protecting Your Digital Assets Prof. Gene Tsudik Associate Dean of Research & Graduate Studies Donald Bren.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Multimedia & Mobile Communications Lab.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
MWIF Confidential MWIF-Arch Security Task Force Task 5: Security for Signaling July 11, 2001 Baba, Shinichi Ready for MWIF Kansas.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Security fundamentals Topic 10 Securing the network perimeter.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Freenet: Anonymous Storage and Retrieval of Information
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Sheng Jiang (Speaker) Xu Chen Xuan Song Huawei Neighbor Cache Protection in Neighbor Discover Protocol draft-jiang-v6ops-nc-prtection-01 IETF 77 V6OPS.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security fundamentals
Zueyong Zhu† and J. William Atwood‡
Secure Sockets Layer (SSL)
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Unstructured Routing : Gnutella and Freenet
WJEC GCSE Computer Science
SPINE: Surveillance protection in the network Elements
Presentation transcript:

Active Protocols for Agile Censor-Resistant Networks Robert Ricci Jay Lepreau University of Utah May 22, 2001

Key Ideas Censor-resistant (p2p) publishing is a compelling and feasible application of active networking …through on-demand, rapid, decentralized, diversification of the hop-by-hop protocol We prototyped this in Freenet

Active Networking’s Biggest Problem Demand: no killer app Inherent problem, by definition! The space of AN protocols is interesting, not any given protocol But… a good match for censor-resistant networks

Censor-Resistant Networks Goals –Make intentional deletion or denial of access infeasible or difficult –Often: Anonymity Usually: overlay network An example: Freenet –Keyed data retrieval system; routing based on a hash of key –Message initiation/relaying look the same –Copies made along return route for requests: preserves popular data

Some Problems Facing CRNs CRN traffic may be identifiable –Static set of protocols a weakness Mere membership may be incriminating –Only identification may be necessary, not eavesdropping –Last link vulnerable: mercy of ISP Users on restricted networks cannot participate –But special techniques can get traffic through firewalls, proxies, etc.

Agile Protocols Use active networking techniques for replacement of single-hop protocols Completely decentralized –Any node can create a new protocol & pass to its peer –Rapid response time to censorship –Nodes can customize for their environment Unbounded set of protocols –Attacker cannot even know what percentage of set they have discovered

Protocol Examples Disguise and tunnel, eg through SMTP, HTTP Port-hopping… randomly Port-smearing (~spread spectrum) Bounce thru 3rd host Steganography …even better in wireless domain: physical & link level

“Protocol Objects” Protocol Objects implement replacement single-hop protocols Identified by content hash

What About Malicious Protocol Objects?

Protecting Local Node’s Integrity, Privacy, and Availability Threat model like Java applet, but worse for privacy –node state: cache contents, neighbor list, IP addr, username, hard drive contents –message itself Integrity and privacy: std type-safety and namespace isolation Resource attacks: resource-managing JVM [OSDI’00,...]

Publishing-specific DoS Attacks Same general issues as malicious nodes Failure (total or intermittent) –Either malicious or unintentional –Heuristic approach: rate Protocol Objects Ratings based on success rates for requests Evaluate via loopback test harness –Ratings are node-local More attacks/responses in paper

What About Bootstrapping? Shared by base Freenet system: must acquire initial {IP addr, port} out-of- band Now need {IP addr, byte code} Quantitative difference ==> qualitative change? Memory, piece of paper ==> floppy disk, attachment, applet Conclusion: acceptable

Our Implementation Prototype based on Freenet system Peers can exchange Java bytecode for new protocols Protocol usage can be asymmetric, can change on any message boundary Restricted namespace

Four sample Protocol Objects ‘Classic’ Freenet protocol HTTPProtocol: Looks (vaguely) like HTTP TrickyProtocol: Negotiates port change after every message SpreadProtocol: Splits message on arbitrary byte boundaries, sends each chunk on a different port

Reprise:AN’s Major Technical Challenges Performance: no problem –In Java already! –Overlay network: IP not my problem Security –Key: change local, keep global protocol –Global network: domain-specific, therefore tractable. –Local to node: tractable, based on recent research

Conclusions, Future Work AN techniques seem likely to improve the censor-resistance of CR networks Feasible to implement in existing systems Future work –Implement ratings, etc. –Evaluate in lab –Evaluate “in the wild”

Active Networking’s Major Technical Challenges Performance Security –Local: node –Global: network

Attacks (cont’d) Selective failure: targeted censorship –Solution: encrypt before passing to PO Attack on document integrity –Reduce system integrity, or ‘tag’ for tracing –Solution: secure hash