a tale of research: from crowds to deeper understandings matthew wright jan. 25, 2006 6392-017: adv....

27
A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Upload: mervyn-johnston

Post on 20-Jan-2016

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

A Tale of Research:From Crowds to Deeper

Understandings

Matthew WrightJan. 25, 2006

6392-017: Adv. Network Security

Page 2: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Overview

• Act I: Hordes– Applying a tool elsewhere

• Act 2: The “Predecessor Attack”– How it works– Proof– Analysis– Simulation

• Act 3: (then) Future Directions

Page 3: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

A New Application

• Brian Levine & Clay Shields– Multicast & Networking

• Properties of Multicast– many receivers– tree structure– subscription model

• Status is unknown to routers and hosts• Bad for maintenance

– efficient for streaming

Page 4: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

One Issue w/ Crowds

• Crowds– Network costs are high– TCP over multiple hops is bad for

streams

I

W

R

Z

X Y

Page 5: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Hordes

• Crowds 4 outgoing– (requests, ACKs)

• Multicast 4 incoming streams– Everyone joins multiple

trees– Don’t know who’s on each

tree– Don’t know who’s

listening

Page 6: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Act I Lessons

• Understanding Prior Work– Find problems & try to solve them

• Apply New Tools– Rather, old tools, but new to the area

Page 7: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Act II: Another Issue w/ Crowds

• What does 5.3.2 say?• What does it not say?

Page 8: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Adding New Members

• If paths are maintained indefinitely, any member joining the group would be immediately identifiable as the initiator.

• Because of this, group joins occur in batches (e.g., once every hour).

• Each time new members are allowed in, new paths are created for all members.

Page 9: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

WB Z

Intuitive notion of passive attacks

A

E

YXT DC

A

Page 10: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Attacking Crowds

• Paths change• Attacker sees

session-identifying info– Responder’s IP

address– Cookie, login

name, specific content

Z

I

R

Y

X

A

Page 11: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Attacking Crowds

• Paths change• Attacker sees

session-identifying info– Responder’s IP

address– Cookie, login

name, specific content

Z

I

R

Y

X

A

Page 12: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

• Log the node before the attacker– n Crowds nodes

Attacking Crowds

I 1 2 3 L…

When in this positionprob=1 that initiator ispredecessor.

When in any of these positions, prob=1/n for any node as predecessor.

node

count

I 41

X 18

Y 24

Z 17

Page 13: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Question

• What are the contributions of WALS02?

Page 14: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Attacking in General

• Attack applies to any protocol for anonymity, provided that:– Paths* of proxies change– Uniformly random selection of paths– There exists a position of attackers:

• see the initiator send messages in the session

• determine the session information

Page 15: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

• Goal: Quantify time required for attack to succeed

• Notation– n is the number of Crowds nodes– c is the number of attackers nodes (c < n )

• Observations– Probability of selecting an attacker for a

given position: (c / n )

Crowds Analysis

n - nodesc - attackers

Page 16: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Crowds Analysis

A B I X Y Z

… …

• T rounds (path reformations)

1/2 E(I)No. of times each node is seen by the attackers

Page 17: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Crowds Analysis

• Chernoff bounds– Q: How big does T have to be?– A: The attacker must be in the first

position on the initiator’s path several times•c/n chance•n/c expectation

– O(n/c log n) times to get a high probability (n-2)/n

n - nodesc - attackers

Page 18: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

• Initiator-chosen paths− Instead of flipping a coin, the Initiator chooses the

entire path and builds an onion. IXYZR− Layered encryption of data using the public key

of each proxy in the path.

Onion Routing (GRS96)

data{R,data}Kz+{Z,{R,data}Kz+}Ky+{Y,{Z,{R,data}Kz+}Ky+}Kx+

• Sending the onion

• I X: {Y,{Z,{R,data}Kz+}Ky+}Kx+

• XY: {Z,{R,data}Kz+}Ky+

• YZ: {R,data}Kz+

• ZR: data

Page 19: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Onion Routing

A1 Delta A2

3:12:20 3:12:30

3:12:37 3:12:47

3:12:49 3:12:59

I

A1

R

A2

X

17 ms

12 ms

Y

Page 20: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Mix-Nets (Ch81+)

• Same as Onion Routing• Added

– Dummy messages– Batching– Message reordering

• Stops Timing attacks

Page 21: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

• Insufficient to have just one node• Timing analysis allows two attackers to link I and R

• The exponent is intuitively related to the number of positions on the path needed to mark an entry.

• O( (n/c)2 log n) path resets

Attacking Onion Routing

I

A1

R

A2

X Y

n - nodesc - attackers

Page 22: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Attacking Mix-Nets

• Mixing– Reordering messages– Dummy messages– Delay

• Stops timing attacks– O.R. attack no longer works– Need the entire path to trace the message

• To attack Mix-nets, if the path is L nodes long, then L attackers have to appear in sequence.– In each round, chances are (c/n)L.

• O( (n/c)L log n) path resets n - nodesc - attackers

Page 23: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Summary of Predecessor Attacks

• Attack effects all systems of anonymous communications.

• Apparent trade-off between performance and security.

Protocol Rounds

Crowds, Hordes

O(n/c log n)

Onion Routing

O((n/c)2 log n)

Mix-NetsO((n/c)L log n)

DC-RingO(n log n)

DC-Full Requires c=n-1 attackers

n - nodesc - attackers

Page 24: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Act II Lessons

• Answer open questions– Is it efficient enough for X application?– What are the tradeoffs here?

• Generalize solutions (or attacks)– Where else does this apply?– Can it be modified to apply to a group?

• With what costs/issues?

Page 25: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Act III: The next step

• What did WALS02 leave unanswered?

Page 26: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Questions (II)

• Consequences for users?– You’re not secure forever

• How tight are these bounds?

• Are there defenses?

Page 27: A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security

Assumptions that can be broken

• We assumed that all nodes are chosen for each spot on the path with equal probability– What if nodes are chosen with a bias?