Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.

Slides:



Advertisements
Similar presentations
SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
Advertisements

ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Tor: The Second-Generation Onion Router
LASTor: A Low-Latency AS-Aware Tor Client
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen et. al NDSS 2014 Presenter: Yue Li Part of slides adapted from R.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
Onion Routing Security Analysis Aaron Johnson U.S. Naval Research Laboratory DC-Area Anonymity, Privacy, and Security Seminar.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
I NTERNET A NONYMITY By Esra Erdin. Introduction Types of Anonymity Systems TOR Overview Working Mechanism of TOR I2P Overview Working Mechanism of I2P.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
A New Replay Attack Against Anonymous Communication Networks Xinwen Fu June 30, 2015.
NETWORK SECURITY.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Routing Around Decoys Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper Proposed in FOCI'11, USINIX Security'11 and CCS'11 Presented by:
Can SSL and TOR be intercepted? Secure Socket Layer.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
The Silk Road: An Online Marketplace
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
LASTor: A Low-Latency AS-Aware Tor Client. Tor  Stands for The Onion Router  Goals: Anonymity ○ Each hop only knows previous and next hop on a path.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Tor Bruce Maggs relying on materials from
Can SSL and TOR be intercepted? Secure Socket Layer.
Tor Bruce Maggs relying on materials from
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (FALL 2016)
The Onion Router Hao-Lun Hsu
Network Security Analysis Name : Waleed Al-Rumaih ID :
Anonymous Communication
Exercise ?: TOR.
Inside Job: Applying Traffic Analysis to Measure Tor from Within
Privacy Through Anonymous Connection and Browsing
0x1A Great Papers in Computer Security
Anupam Das , Nikita Borisov
Anonymous Communication
Anupam Das , Nikita Borisov
CS590B/690B Detecting network interference (Spring 2018)
Anonymity (Privacy) Suppose you are surfing the Web.
Bruce Maggs relying on materials from
Anonymous Communication
Bruce Maggs relying on materials from
Anonymous Communication
Bruce Maggs relying on materials from
Rob Jansen, U.S. Naval Research Laboratory
Presentation transcript:

Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI

Overview  What is Tor Network?  Motivation  How does Tor work?  Tor Protocol Weaknesses and security Threats  Entry exit attack  Traffic pattern attacks  Implementation and Analysis  End-User awareness

What is Tor?  Tries to anonymize the source of network traffic  Normal internet encryption is not enough to protect your identity  Originally developed by the U.S. Navy for government communications  Now publicly maintained and has millions of users  Tor Browser enables anonymous web browsing  Free  Anyone can contribute to Tor Network!!!  Open source

Motivation  Tor is Growing Rapidly  2+ million users  Relays  Internet security has become a ubiquitous problem  Tor could be a solution  OSU security club is planning to enable Tor Router  Some protocol level security concerns  Controversial usage of Tor network  Illegal activity  Government censorship

Tor Statistics CountryMean daily users United States (16.31 %) Germany (9.24 %) Russia (6.83 %) France (6.30 %) United Kingdom (4.42 %) Spain (3.93 %) Brazil (3.83 %) Italy (3.64 %) Poland (2.52 %) Japan (2.32 %) [1]

How doesn’t Tor work? Charlie Lucy Hi Lucy Hi Charlie

How does Tor work?  Tor is effectively a large and sophisticated proxy service.  Instead of connecting to a sever directly, a “circuit” through several proxy (Relay) servers is created  All traffic is then routed through the circuit  Protocol level identification information is removed when passing through each relay  The destination can not determine the source of the traffic

How does Tor work? Charlie Lucy Hi Lucy Hi anonymous Encrypted (TLS) Plaintext Tor Relay (proxy)

How does Tor work? Charlie Lucy

How does Tor work? Charlie Lucy

Charlie How does Tor work? Lucy

Charlie How does Tor work? Lucy

Charlie How does Tor work? Lucy

Circuit establishment  Client get a list of relays from a directory server  For each connection, the client select 3 or more relays at random*  An encrypted connection to the first relay is established.  Subsequent connection are established by piping them through the previous relays  The final relay performs a TCP handshake with the destination server * The first one should not be at random (entry guard)

Circuit establishment Charlie Lucy OR1 Create, c1, key OR2 Created, c1, key’ Extend, c1, {OR2, key’’’} Extended, c1, {OR2, key’’’’} Create, c2, key’’’ Created, c2, key’’’’ Relay, c1, {{Hi Lucy}} Relay, c1, {{Hi anonymous}} Relay, c2, {Hi Lucy} Relay, c2, {Hi anonymous} Hi Lucy Hi anonymous TLS {message} = encrypted message

Attacks  How well does this protocol hold up again traffic confirmation attacks  No one relay can know the whole path  What if all relays collude?  Anonymity is lost  Unlikely that all relays will collude (they are chosen randomly*)  What if only two relays collude? [2]  What if all relays are honest? [3]

Entry Exit attack

Threat model Charlie Lucy Assume the entry and exit relays are colluding (reasonable?) [2]

Attack Charlie Lucy {{{Hi Lucy} 1 } 1 } 1 {{Hi Lucy} 1 } 1 {Hi Lucy} 1 Hi Lucy {{Hi Lucy} 1 } 1 {hfhjfdsg} {{______} 2 } 2 dasdfsa [2]

Attack Charlie Lucy dasdfsa [2]

Our Counter measure

Attack Charlie Lucy {{______} 2 } 2 {{Hi Lucy} 1 } 1 {hfhjfdsg} [2]

Our counter measures  Add additional authentication to each message  Each message needs to be validated at each relay  Will stop bad messages from reaching the exit relay  Will add additional overhead to the protocol  Current message look like: Relay, id, {{{message, MAC}}}  Proposed message look like: Relay, id, {{{message, MAC} MAC} MAC} MAC = message authentication code

Our counter measure Charlie Lucy Hi Lucy {sdfgsdfsdsd} 1,sdfgsd

Current Counter measure

Prob. of selecting compromised relays Tor Network

Current counter measure Tor Network [4]

Traffic pattern attack

Charlie Traffic pattern attacks  Tor relays try and limit latency by forwarding traffic as fast as possible  As such, messages keep their relative timing  Can be used as an attack [4]  Potentially the worst attack…  Very hard to detect Tor Network Lucy

Qualifying the attacks  Don’t think tor is completely broken…  Most of the attacks rely on traffic confirmation where the attack suspects the destination  This is often more than enough for targeted attack  Limits the effectiveness of “dragnet” surveillance  Some work has shown course traffic pattern surveillance can still be moderately effective at dragnet surveillance on a large set of users  Base rate fallacy [5]

Implementation  Implementation  Primitive Tor network Application in ns3  Implementing malicious entry, exit relay attack and proposed counter measure.

Conclusion  Fewer entry points you use the better  Targeted attacks are still effective  Use with caution if you suspect an active nation state like adversary

Q&A

Sources  [1] The Tor Project  [2] Xinwen Fu, et al. One Cell is Enough to Break Tor’s Anonymity, Anonymity.pdf Anonymity.pdf  [3] Alex Biryukov, et al. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization,  [4] Tariq Elahi, et al. Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor,  [5] How I Learned to Stop Ph34ring NSA and Love the Base Rate Fallacy  [6] Mike Perry. Experimental Defense for Website Traffic Fingerprinting,