270 likes | 286 Views
Explore the application of Crowds and Multicast networks in network security. Learn about the analysis of attacks and the implications for anonymity. Discover new ways to enhance network security and efficiency.
E N D
A Tale of Research:From Crowds to Deeper Understandings Matthew Wright Jan. 25, 2006 6392-017: Adv. Network Security
Overview • Act I: Hordes • Applying a tool elsewhere • Act 2: The “Predecessor Attack” • How it works • Proof • Analysis • Simulation • Act 3: (then) Future Directions
A New Application • Brian Levine & Clay Shields • Multicast & Networking • Properties of Multicast • many receivers • tree structure • subscription model • Status is unknown to routers and hosts • Bad for maintenance • efficient for streaming
One Issue w/ Crowds • Crowds • Network costs are high • TCP over multiple hops is bad for streams R X Y I W Z
Hordes • Crowds 4 outgoing • (requests, ACKs) • Multicast 4 incoming streams • Everyone joins multiple trees • Don’t know who’s on each tree • Don’t know who’s listening
Act I Lessons • Understanding Prior Work • Find problems & try to solve them • Apply New Tools • Rather, old tools, but new to the area
Act II: Another Issue w/ Crowds • What does 5.3.2 say? • What does it not say?
Adding New Members • If paths are maintained indefinitely, any member joining the group would be immediately identifiable as the initiator. • Because of this, group joins occur in batches (e.g., once every hour). • Each time new members are allowed in, new paths are created for all members.
Intuitive notion of passive attacks A A Z B W E D Y T C X
Attacking Crowds I • Paths change • Attacker sees session-identifying info • Responder’s IP address • Cookie, login name, specific content X A Y Z R
Attacking Crowds I • Paths change • Attacker sees session-identifying info • Responder’s IP address • Cookie, login name, specific content X A Y Z R
When in this positionprob=1 that initiator ispredecessor. When in any of these positions, prob=1/n for any node as predecessor. Attacking Crowds • Log the node before the attacker • nCrowds nodes … I 1 2 3 L
Question • What are the contributions of WALS02?
Attacking in General • Attack applies to any protocol for anonymity, provided that: • Paths* of proxies change • Uniformly random selection of paths • There exists a position of attackers: • see the initiator send messages in the session • determine the session information
Crowds Analysis • Goal: Quantify time required for attack to succeed • Notation • nis the number of Crowds nodes • c is the number of attackers nodes (c < n) • Observations • Probability of selecting an attacker for a given position: (c / n ) n- nodes c - attackers
1/2 E(I) Crowds Analysis • T rounds (path reformations) No. of times each node is seen by the attackers … … A B I X Y Z
Crowds Analysis • Chernoff bounds • Q: How big does T have to be? • A: The attacker must be in the first position on the initiator’s path several times • c/n chance • n/c expectation • O(n/c log n) times to get a high probability (n-2)/n n- nodes c - attackers
Onion Routing (GRS96) • Initiator-chosen paths • Instead of flipping a coin, the Initiator chooses the entire path and builds an onion. IàXàYàZàR • Layered encryption of data using the public key of each proxy in the path. {Z,{R,data}Kz+}Ky+ {Y,{Z,{R,data}Kz+}Ky+}Kx+ {R,data}Kz+ data • Sending the onion • I àX: {Y,{Z,{R,data}Kz+}Ky+}Kx+ • XàY: {Z,{R,data}Kz+}Ky+ • YàZ: {R,data}Kz+ • ZàR: data
17 ms 12 ms Onion Routing R X Y I A1 A2
Mix-Nets (Ch81+) • Same as Onion Routing • Added • Dummy messages • Batching • Message reordering • Stops Timing attacks
Attacking Onion Routing • Insufficient to have just one node • Timing analysis allows two attackers to link I and R • The exponent is intuitively related to the number of positions on the path needed to mark an entry. • O( (n/c)2 log n) path resets R X Y I A1 A2 n- nodes c - attackers
Attacking Mix-Nets • Mixing • Reordering messages • Dummy messages • Delay • Stops timing attacks • O.R. attack no longer works • Need the entire path to trace the message • To attack Mix-nets, if the path is L nodes long, then L attackers have to appear in sequence. • In each round, chances are (c/n)L. • O( (n/c)L log n) path resets n- nodes c - attackers
Summary of Predecessor Attacks • Attack effects all systems of anonymous communications. • Apparent trade-off between performance and security. n- nodes c - attackers
Act II Lessons • Answer open questions • Is it efficient enough for X application? • What are the tradeoffs here? • Generalize solutions (or attacks) • Where else does this apply? • Can it be modified to apply to a group? • With what costs/issues?
Act III: The next step • What did WALS02 leave unanswered?
Questions (II) • Consequences for users? • You’re not secure forever • How tight are these bounds? • Are there defenses?
Assumptions that can be broken • We assumed that all nodes are chosen for each spot on the path with equal probability • What if nodes are chosen with a bias?