270 likes | 285 Views
A Tale of Research: From Crowds to Deeper Understandings. Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security. Overview. Act I: Hordes Applying a tool elsewhere Act 2: The “Predecessor Attack” How it works Proof Analysis Simulation Act 3: (then) Future Directions.
E N D
A Tale of Research:From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security
Overview • Act I: Hordes • Applying a tool elsewhere • Act 2: The “Predecessor Attack” • How it works • Proof • Analysis • Simulation • Act 3: (then) Future Directions
A New Application • Brian Levine & Clay Shields • Multicast & Networking • Properties of Multicast • many receivers • tree structure • subscription model • Status is unknown to routers and hosts • Bad for maintenance • efficient for streaming
One Issue w/ Crowds • Crowds • Network costs are high • TCP over multiple hops is bad for streams R X Y I W Z
Hordes • Crowds 4 outgoing • (requests, ACKs) • Multicast 4 incoming streams • Everyone joins multiple trees • Don’t know who’s on each tree • Don’t know who’s listening
Act I Lessons • Understanding Prior Work • Find problems & try to solve them • Apply New Tools • Rather, old tools, but new to the area
Act II: Another Issue w/ Crowds • What does 5.3.2 say? • What does it not say?
Adding New Members • If paths are maintained indefinitely, any member joining the group would be immediately identifiable as the initiator. • Because of this, group joins occur in batches (e.g., once every hour). • Each time new members are allowed in, new paths are created for all members.
Intuitive notion of passive attacks A A Z B W E D Y T C X
Attacking Crowds I • Paths change • Attacker sees session-identifying info • Responder’s IP address • Cookie, login name, specific content X A Y Z R
Attacking Crowds I • Paths change • Attacker sees session-identifying info • Responder’s IP address • Cookie, login name, specific content X A Y Z R
When in this positionprob=1 that initiator ispredecessor. When in any of these positions, prob=1/n for any node as predecessor. Attacking Crowds • Log the node before the attacker • nCrowds nodes … I 1 2 3 L
Question • What are the contributions of WALS02?
Attacking in General • Attack applies to any protocol for anonymity, provided that: • Paths* of proxies change • Uniformly random selection of paths • There exists a position of attackers: • see the initiator send messages in the session • determine the session information
Crowds Analysis • Goal: Quantify time required for attack to succeed • Notation • nis the number of Crowds nodes • c is the number of attackers nodes (c < n) • Observations • Probability of selecting an attacker for a given position: (c / n ) n- nodes c - attackers
1/2 E(I) Crowds Analysis • T rounds (path reformations) No. of times each node is seen by the attackers … … A B I X Y Z
Crowds Analysis • Chernoff bounds • Q: How big does T have to be? • A: The attacker must be in the first position on the initiator’s path several times • c/n chance • n/c expectation • O(n/c log n) times to get a high probability (n-2)/n n- nodes c - attackers
Onion Routing (GRS96) • Initiator-chosen paths • Instead of flipping a coin, the Initiator chooses the entire path and builds an onion. IàXàYàZàR • Layered encryption of data using the public key of each proxy in the path. {Z,{R,data}Kz+}Ky+ {Y,{Z,{R,data}Kz+}Ky+}Kx+ {R,data}Kz+ data • Sending the onion • I àX: {Y,{Z,{R,data}Kz+}Ky+}Kx+ • XàY: {Z,{R,data}Kz+}Ky+ • YàZ: {R,data}Kz+ • ZàR: data
17 ms 12 ms Onion Routing R X Y I A1 A2
Mix-Nets (Ch81+) • Same as Onion Routing • Added • Dummy messages • Batching • Message reordering • Stops Timing attacks
Attacking Onion Routing • Insufficient to have just one node • Timing analysis allows two attackers to link I and R • The exponent is intuitively related to the number of positions on the path needed to mark an entry. • O( (n/c)2 log n) path resets R X Y I A1 A2 n- nodes c - attackers
Attacking Mix-Nets • Mixing • Reordering messages • Dummy messages • Delay • Stops timing attacks • O.R. attack no longer works • Need the entire path to trace the message • To attack Mix-nets, if the path is L nodes long, then L attackers have to appear in sequence. • In each round, chances are (c/n)L. • O( (n/c)L log n) path resets n- nodes c - attackers
Summary of Predecessor Attacks • Attack effects all systems of anonymous communications. • Apparent trade-off between performance and security. n- nodes c - attackers
Act II Lessons • Answer open questions • Is it efficient enough for X application? • What are the tradeoffs here? • Generalize solutions (or attacks) • Where else does this apply? • Can it be modified to apply to a group? • With what costs/issues?
Act III: The next step • What did WALS02 leave unanswered?
Questions (II) • Consequences for users? • You’re not secure forever • How tight are these bounds? • Are there defenses?
Assumptions that can be broken • We assumed that all nodes are chosen for each spot on the path with equal probability • What if nodes are chosen with a bias?