220 likes | 303 Views
RAID 2011 Sanbuddho Chakravarty , Georgios Portokalidis , Michalis Polychronakis , Angilos D. Keronytis Columbia University, NY, USA. Detecting Traffic Snooping in Tor Using Decoys. 報告者 : 張逸文. Outline. Introduction Background System Architecture Deployment Results
E N D
RAID 2011 SanbuddhoChakravarty, GeorgiosPortokalidis, MichalisPolychronakis, Angilos D. Keronytis Columbia University, NY, USA Detecting Traffic Snooping in Tor Using Decoys 報告者: 張逸文
Outline • Introduction • Background • System Architecture • Deployment Results • Discussion and Future work • Related work • Conclusion
Introduction(1/2) • Anonymity and privacy-preserving systems • Tor[15], , Anonymizer • Operating by routing user traffic through a single or multiple proxies, often using layered encryption schemes • Absenceofend-to-endencryption • Man-in-the-middleattacks • HTTPSswitchtoplainHTTP
Introduction(2/2) • Usingdecoytraffictodetecteavesdroppinginproxyingarchitecturesandinparticularanonymouscommunicationsystems • Other uses of decoy traffic: unprotected wireless network[9], warn of insider threats[8] • Multiple “bait” credentials for IMAP and SMTP servers
Background • Tor Anonymity Network • The most widely used low latency anonymity networks • Users can hide their IP => Hidden services • How it works? • Threat Model • Malicious exit nodes • Extracting credentials, eavesdropping private information • Intercept the traffic of SSL connections
System Architecture(1/6) • Approach • Network eavesdropping is a passive operationwithout observable effects • Credentials without application-layer encryption can be used by the eavesdropper => observable • We entice a prospective snooper to use intercepted decoy credentials for accessing a service under control
System Architecture(3/6) • Implementation • Choosing a set of services that • are supported by a large number of Tor exit nodes • support unencrypted authentication by a clear-text protocol • The number of Tor exit nodes that allowed the relaying of traffic through various TCP port numbers • IMAP(port 143) and SMTP (port 587) protocols
System Architecture(5/6) • Decoy Traffic Transmission and Eavesdropping Detection • Client:implemented using Perl and service protocol emulation is provided by Net : : IMAPClient and Net : : SMTP modules • Client is hosted on Ubuntu Server Linux v8.04 • The client creates one connection to each decoy server every day through each Tor exit node (supported) • An exit node ties with a set of credentials for each decoy service
System Architecture(6/6) • Decoy services:Courier IMAP v4.6.0 & Postfix v2.7.0 • Illegitimate connections are identified by logs recorded at client and server • Important implementation considerations • Time synchronization => Network Time Protocol • Amount and Quality of Decoy Traffic • The believability of the decoy traffic [9] • Eavesdropping Incident Verification
Deployment Results • August ,2010 ~ May ,2011 • Ten traffic interception incidents all received by decoy IMAP server • Table 1. • Available bandwidth of the malicious exit nodes • Locations of the Tor exit nodes involved in the observed incidents • Geo-IP tool
Discussion and Future work(1/4) • Detection confidence • The ease of installing and operating a Tor exit node • The host system may lack of software patches / have poor security • Connecting back to the decoy server from the same exit node • Future work • Using multiple replicas of the decoy servers scattered in different networks and associate different sets of credentials
Discussion and Future work(2/4) • Decoy Traffic Credibility • Increasing the number and diversity of the innocuous email messages in SMTP traffic • Containing bait documents that would ping back to our system • Capturing network traces of protocol interactions using various real IMAP clients and servers
Discussion and Future work(3/4) • Detection of HTTP Session Hijacking • Some sites switch back to HTTP after the user has logged in • Users are ignorant about HTTPS • Attackers can steal the session cookie in the HTTP requests of authenticated users • Futurework • detecting HTTP session hijacking attacks by the use of decoy accounts
Discussion and Future work(4/4) • Traffic Eavesdropping and Anonymity Degradation • Reducing anonymity set • Eavesdropping Detection as a Network Service • Honeynet-based system • Used as an eavesdrop detection system
Related work(1/2) • Clifford Stoll • The Cuckoo’s Egg:trapping an intruder that broke into the systems of the Lawrence Berkeley National Laboratory • Honeypots have been extensively used for modeling, logging and analyzing attacks • Honeytokens • pieces of information. After the adversary release it, any subsequent use of if can clearly indicate unauthorized access
Related work(2/2) • Bowen et al. • WiFi traffic as a basis for the generation of decoy traffic with realistic network interactions • McCoy et al. • taking advantage of the IP address resolution functionality of network traffic capturing tools • The functionality may disabled by the eavesdropper
conclusion • Applying decoy user credentials for the detection of traffic interception in anonymity network • Detected ten cases in which decoy credentials were used by a third-party to log in to servers under our control • How the proposed method can be extended for the detection of HTTP session hijacking attacks