Routing Around Decoys Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper Proposed in FOCI'11, USINIX Security'11 and CCS'11 Presented by:

Slides:



Advertisements
Similar presentations
SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
Advertisements

Chris Karlof and David Wagner
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Tor: The Second-Generation Onion Router
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
LASTor: A Low-Latency AS-Aware Tor Client
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.
The Connectivity and Fault-Tolerance of the Internet Topology
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen et. al NDSS 2014 Presenter: Yue Li Part of slides adapted from R.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
On Traffic Analysis in Tor Guest Lecture, ELE 574 Communications Security and Privacy Princeton University April 3 rd, 2014 Dr. Rob Jansen U.S. Naval Research.
Traffic Engineering With Traditional IP Routing Protocols
Delayed Internet Routing Convergence Craig Labovitz, Abha Ahuja, Abhijit Bose, Farham Jahanian Presented By Harpal Singh Bassali.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Clouseau: A practical IP spoofing defense through route-based filtering Jelena Mirkovic, University of Delaware Nikola Jevtic,
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Never Been KIST: Tor’s Congestion Management Blossoms with Kernel- Informed Socket Transport 23 rd USENIX Security Symposium August 20 th 2014 Rob JansenUS.
Anonymity on the Internet Presented by Randy Unger.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
Linux Networking and Security
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Ying Zhang Z. Morley Mao Jia Wang Presented in NDSS07 Prepared by : Hale Ismet.
Measurement in the Internet Measurement in the Internet Paul Barford University of Wisconsin - Madison Spring, 2001.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 23 PHILLIPA GILL - STONY BROOK U.
DoS/DDoS attack and defense
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Strengthening Tor against Eavesdropping Correlation Attacks Robert Thomas CSCE APR 2015 Audio:
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
6to4
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Network Devices and Firewalls Lesson 14. It applies to our class…
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Decoy Router Placement Against a Smart Adversary Jacopo Cesareo, Michael Schapira, and Jennifer Rexford Princeton University.
Mapping/Topology attacks on Virtual Machines
CS590B/690B Detecting Network Interference (FALL 2016)
CS590B/690B Detecting Network Interference (Fall 2016)
Chapter 18 IP Security  IP Security (IPSec)
Practical Censorship Evasion Leveraging Content Delivery Networks
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference
No Direction Home: The True cost of Routing Around Decoys
Privacy Through Anonymous Connection and Browsing
0x1A Great Papers in Computer Security
CS590B/690B Detecting network interference (Spring 2018)
Anonymous Communication
Presentation transcript:

Routing Around Decoys Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper Proposed in FOCI'11, USINIX Security'11 and CCS'11 Presented by: Aman Goel

Decoy Routing and its adversary - Decoy routing, a new approach against web censorship - Aims to hamper nation-state level Internet with routers - We analyze its security against a routing adversary

What we are going to talk about? ● - Background on modern decoys ● - Routing adversary introduction ● - Methods of detecting decoys ● - Timing attacks ● - Countermeasures ● - Conclusion ● - Related Work

Modern censorship resistance tools ● Traditional means: end-to-end proxy, TOR, JAP, Ultra-surf... ● - Quickly blocked after government probing ● - Decoy routing: puts proxy in middle of paths ● - user initiate a TLS connection to an uncensored host (hidden on net) ● - this host is called "overt destination", or decoy ● - decoy acts as a proxy sending data to actual "covert destination" ● - Decoy routing is better because... ● - Avoid censor's enumeration ● - Hide client's usage

Ultra-surf

Routing adversary overview ● - A "warden", a new adversary against censorship ● circumvention schemes ● - A censoring authority capable of monitoring / controlling ● packets' routes in subnetwork (premise) ● - Basically, a tool built to defeat decoy routings ● - Hide user's packets from decoy ● - Predict properties of paths, thus reveal decoys ● - Launch confirmation attack, test user's decoy usage

Detecting decoy routers: Availability attack ● Premise theory: Internet routing topology ● Autonomous Systems (ASes) as nodes / hubs ● 3 roles: customer, provider, peer, based on who's carrying traffic ● Providers advertise all routes to all nodes to any customers. ● This pattern is predictable thus we can infer paths between 2 nodes without access to either.

Internet Topology ● The number of autonomous and IP addresses in each country, as well as the number of points of control(the smallest number of ASes that control 90% of IP addresses), and the number of external ASes directly connected to each country.

Detecting decoy routers: Availability attack ● Passive ● - Probing scan conducted by warden's client ● - Scans public directory of decoy routers (ASes) ● Challenge: during probing, warden adversary must effectively mark all "tainted" nodes (maximize shadow) ● - Harder than it seems: instead of 1 path with decoy, all paths to destination need decoys deployed ● - Clean Path method: each warden has at least 1 path that didn't have decoy

Detecting decoy routers: Detection attack ● More active / aggressive ● - Goal: break decoy routing system's unobservability ● TCP Replay Attack: replay TCP packet sent by host, not along tainted path, but along "clean path" ● Forced Asymmetry: alter the path that sent traffic, force user pick a different one ● Crazy Ivan Attack: intensely filp the paths

Illustration of a single confirmation attack ● The warden has both a tainted path and clean path to a destination(figure 1), and allows users to utilize the tainted path. The warden then replays an observed TCP packet using the clean path. ● A duplicate acknowledgment is seen. ● A TCP reset is instead seen.

Routing adversary's timing attack ● Detect who's using decoy by monitoring network latency ● Detecting Telex vs overt ● Significant difference between the latencies measurements.

Routing adversary's timing attack ● Fingerprinting Covert Destinations (Confirmation attack) ● Warden selects a set of covert destinations as targets ● Enumerate all decoy routers ● When client tries to connect, warden compares by latency ● - Can identify which decoy is used by the graphs ● Construct a database during attacks ● - False positive rate under 10%

Countermeasure ● A strong enough decoy routing network ● - must cover all paths to a large set of destinations ● - infeasible for wardens to launch attacks / block ● Or, surround warden with a "ring" of decoys ● - Depth two ring but it is large in size. ● Or, "ring" popular websites / destinations... ● Or, "ring" specific geographic location... ● Perhaps through political and cultural means to counter censorship is the better way to go

Conclusion ● In this paper, we have introduced a novel adversary model for decoy routing, the routing capable adversary, exploring the actual routing capabilities that a warden has and the implications that such an adversary has with respect to decoy routing. Specifically, we showed how wardens can easily enumerate all deployed decoy routers and use this information to successfully route around all such routers. ● We explored the intricacies of deployment strategies and analyzed the effects they have with respect to the enumeration attacks. ● Can use fingerprinting techniques ● Results show that small deployments can be trivially defeated, requiring larger deployments for decoy routing to be successful. ● However, several of our confirmation attacks still work, even against very large deployments.

Related Work ● Several previous works have explored the impact of ISP-type adversaries on anonymity schemes. ● Feamster analyzed the diversity of AS-level paths in anonymity netwotks, such as TOR and showed how path asymmetry could lead to poor location independence. ● Murdoch examined how even with high AS-level diversity in anonymity networks, many of the packets will travel through a single physical internet exchange allowing a single entity to perform traffic analysis, negating the need for a global view. ● As for timing attacks there has been much research done on how traffic analysis is used on anonymity and similar systems. ● Several papers suggest that using more sophisticated fingerprinting method makes adversaries to perform website fingerprinting in the TOR network to identify the end user. These attacks are based on the size of downloaded files and could potentially be combined with our timing attacks to yield even more accurate identification of covert destinations. ●

Questions