presented by sruthi vemulapalli

21
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis Charles Wright, Scott Coull, Fabian Monrose Presented by Sruthi Vemulapalli

Upload: makaio

Post on 23-Feb-2016

44 views

Category:

Documents


0 download

DESCRIPTION

Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis Charles Wright, Scott Coull , Fabian Monrose. Presented by Sruthi Vemulapalli. Introduction. Network traffic analysis How to reduce the leak of data? Convex optimization Examples - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Presented by  Sruthi Vemulapalli

Traffic Morphing: An Efficient DefenseAgainst Statistical Traffic Analysis

Charles Wright, Scott Coull, Fabian Monrose

Presented by Sruthi Vemulapalli

Page 2: Presented by  Sruthi Vemulapalli

Introduction

• Network traffic analysis• How to reduce the leak of data?• Convex optimization• Examples• Traffic classification techniques

VoIP language classifier Web page classifier

Page 3: Presented by  Sruthi Vemulapalli

• Statistical distribution in encrypted VoIP

• Mimicry attack

• Polymorphic blending technique

• Other approaches

Page 4: Presented by  Sruthi Vemulapalli

Traffic Morphing

• Goal: To provide users with an efficient method of preventing information leakage that induces less overhead.

• Operation :– Selection of source processes– Selection of target processes– Morphing Matrix– Morphing algorithm– Data interception

Page 5: Presented by  Sruthi Vemulapalli

Morphing Matrix

• Source process : X = [x1, x2, . . . , xn]T, xi is the probability

of the ith largest packet size• Target process :

Y = [y1, y2, . . . , yn]T• Morphing Matrix A = [aij], where Y=AX

Page 6: Presented by  Sruthi Vemulapalli

Operation

• Packet received from source application• Altering of packets• Cumulative probability si=sum of the

probabilities for all sizes <=si• Sampling Target size• Advantage :– Minimum overhead– Matrix generation performed offline

Page 7: Presented by  Sruthi Vemulapalli

Morphing via Convex Optimization

• From A we have n2 unknowns• Y=AX representation

• n equations from the matrix

• Another n equations

Page 8: Presented by  Sruthi Vemulapalli

• Minimizing the cost function f0(A) • Solving convex optimization functions• Example

Overall cost matrix A represented as:

• Optimization problem in standard form

Page 9: Presented by  Sruthi Vemulapalli

Additional Morphing Constraints

• Uses: Preserve the quality of the data Minimize number of packets produced

• Adding equality constraints• Disadvantage :

Overspecified equations with no valid solution

Page 10: Presented by  Sruthi Vemulapalli

• Multilevel programming• Example

Comparison function:

First Optimization Problem:

Page 11: Presented by  Sruthi Vemulapalli

• Second Optimization Problem

Page 12: Presented by  Sruthi Vemulapalli

Dealing with Large Sample Spaces

• Problem with growth of constraints Complexity of finding morphing matrices

when n is large becomes prohibitively high

• Divide and Conquer strategy

• Applying the strategy to X and Y vectors

Page 13: Presented by  Sruthi Vemulapalli

• Example (bigram distributions) Initial morphing matrix optimization:

Submatrix optimization:

Page 14: Presented by  Sruthi Vemulapalli

Practical Considerations

• Short Network Sessions

• Variations in Source Distribution

• Reducing Packet Sizes

Page 15: Presented by  Sruthi Vemulapalli

Evaluation

• Encrypted Voice over IP• Whitebox vs Blackbox Morphing

Page 16: Presented by  Sruthi Vemulapalli

• Defeating the Original Classifier

Page 17: Presented by  Sruthi Vemulapalli

• Evaluating Indistinguishability

• White box has the best accuracy over black box

Page 18: Presented by  Sruthi Vemulapalli

Web Page Identification

• Defeating the Original Classifier

Page 19: Presented by  Sruthi Vemulapalli
Page 20: Presented by  Sruthi Vemulapalli

Conclusion

• Traffic morphing, chooses the best way to alter the feature(s) of a packet

• Privacy and efficiency are balanced through the use of convex optimization techniques

• Works in real-time• Reduces the accuracy of the VoIP and

webpage classifier

Page 21: Presented by  Sruthi Vemulapalli

QUESTIONS????