200 likes | 279 Views
U NIVERSITY OF CRETE Department of Computer Science. Low –Resource Routing Attacks Against Anonymous Systems Fragkiadaki Georgia AM681 . Outline. A short overview of the Tor system Analysis of Tor’s router selection algorithms A description of Tor’s envisioned attack model
E N D
UNIVERSITY OF CRETE Department of Computer Science Low –Resource Routing Attacks Against Anonymous Systems Fragkiadaki Georgia AM681
Outline • A short overview of the Tor system • Analysis of Tor’s router selection algorithms • A description of Tor’s envisioned attack model • A overview of the common anonymity metrics • Attack and description attack model • Experiments about attack and which the results • A detailed analysis of proposed defenses • Comparison attack with previous attacks against Tor
Overlay mix-networks • used widely • provide low-latency anonymous communication services • provide perfect anonymity • Tor is one of the most popular privacy enhancing systems • provide optimal performance for interactive application • Goal: the system provide anonymity against non-global adversaries
Introduction • Research Themes: • how can we minimize the requirements necessary for any adversary to compromise the anonymity of a flow • how can we harden Tor against our attacks. • Attack Overview: • The adversary need few malicious nodes to break the anonymity of clients. • Context • Additional Improvements and Other Attacks • Prevention • Broader Implications
Tor System contain : • Onion router (OR) : the server component of the network – is responsible for traffic • Onion proxy (OP) : is the client part of the network • A circuit : is a path of three onion routers through the Tor from OP • entrance router • mix router • exit router
Understanding Tor at a High Level • There is a circuit switched network at the core of Tor • The originator of the circuit knows the complete path • Uses standard cryptographic methods , like TLS (Transport Layer Security) • Onion routing: encrypted cells use a layered scheme. Each hop removes a layer until the last node, so it is fully decrypted. • Onion proxy: forward a local user’ s traffic through the network
Selection Algorithms (SA) Which onion router select Tor to include in a circuit? • Entrance Router SA: • select a set of onion routers that are marked by servers as fast and stable • protect the first hop of a circuit and use more reliable and trustworthy nodes • Non-Entrance Router SA • select non-entrance nodes, which optimize onion router selection for bandwidth and uptime • not always choose the best nodes every time
Common Anonymity Metrics • We define entropy , a metric to measure the amount of anonymity • p(xi) : probability i-th node being including on path • N : the number of routers in the Tor network
Attack Model • We focus on : • Attacking the anonymity of clients, running default configurations • attacking clients, which join the network, after first phase of attack • Phases: • Setting Up • Linking Paths
Phase One: Setting Up • The basic Attack: the adversary’s setup procedure is to enroll or compromise a number of high-bandwidth, high-uptime Tor servers • Resource Reduction: decrease the resource requirements for the malicious nodes • low bandwidth connections • What Happens Next: a goal is to provide a low-latency service about a new client joins the network
Phase Two: Linking Paths • When the full path has been populated with malicious nodes • Each malicious router logs information for each cell received, according to • location of circuit path, • timestamp, • circuit ID, • IP address (previous, next) and • ports
Experiments (1/2) • Experimental Setup • We set up an isolated Tor deployment • not run in real environment, due to probably destructive effects. • determine test with real sizes about Bandwidth Class • create two isolated Tor networks, with 40 and 60 nodes, each running
Experiments • Traffic Generation • would make it more realistic ,but there are not much data available • Malicious Node Configuration • an attacker can correlate, each malicious router advertises a read and write bandwidth capability of 1.5 MB/s and a high uptime
Results of Experiment • There is difference between the analytical expectation and the experimental results • The attack is effective in influencing Tor’s routing mechanisms • Entropy decrease in network when we added malicious nodes • shows the global impact that our attack has on decreasing Tor’s anonymity
Attack Extension • Compromising Existing Clients • Improving Performance Under the Resource-Reduced Attack • Selective Path Disruption • Displacing Honest Entry Guards. • Compromising Only the Entry Node
Previous Attacks Against Tor • There have been published three attacks in the past parts of the Tor protocol: • Murdoch and Danezis: a low cost traffic – analysis technique • Overlier and Syverson : attack located hidden servers inside the Tor network • Murdoch: the key to this attack is the observation that when a server is idle, its CPU runs at a cooler temperature
Conclusion (1/2) • We introduce a low-resource traffic analysis attack , which is highly practical • an attacker can compromise the anonymity of a large amount of the communication channels through the network • Tor is vulnerable to attacks from non-global adversaries that control only a few high-resource nodes, or nodes that are perceived to be high-resource. • the system utilizes a preferential routing algorithm that attempts to optimize for performance and this fact exploits the attack
Conclusion (2/2) • an adversary can, with high probability, compromise the entrance and exit servers on a route for new clients
Questions? Thank you for attention