Fingerprinting Websites Using Remote Traffic Analysis

Size: px
Start display at page:

Download "Fingerprinting Websites Using Remote Traffic Analysis"

Transcription

1 Fingerprinting Websites Using Remote Traffic Analysis Xun Gong, Negar Kiyavash, Nikita Borisov ECE Department. IESE Department. University of Illinois at Urbana-Champaign Abstract Recent work has shown that traffic analysis of data carried on encrypted tunnels can be used to recover important semantic information. As one example, attackers can find out which website, or which page on a website, a user is accessing simply by monitoring the traffic patterns. We show that traffic analysis is a much greater threat to privacy than previously thought, as such attacks can be carried out remotely. In particular, we show that, to perform traffic analysis, adversaries do not need to directly observe the traffic patterns. Instead, they can send probes from a far-off vantage point that exploit a queuing side channel in routers. We demonstrate the threat of such remote traffic analysis by developing a remote website fingerprinting attack that works against home broadband users. Because the observations obtained by probes are more noisy than direct observations, we had to take a new approach to detection that uses the full time series data contained in the observation, rather than summary statistics used in previous work. We perform k-nearest neighbor classification using dynamic time warping (DTW) distance metric. We find that in our experiments, we are able to fingerprint a website with 80% accuracy in both testbed and target system. This shows that remote traffic analysis represents a real threat to privacy on the Internet. I. INTRODUCTION Protecting the secrecy of online activities from prying eyes is a long-standing problem in Internet security. A number of encryption technologies (e.g., Transport Layer Security (TLS) [7], IPSec [15], and SSH [31]) protect the contents of much of today s communication. Anonymizing communication systems, such as Tor [8], offer complementary protection, hiding the identity of the user from their communicating parties, and the relationships between parties from outside observers. However, both these technologies are vulnerable to traffic analysis, where patterns of communication such as packet sizes, timings, and counts are used to infer sensitive information. One important class of traffic analysis attack targets application layer privacy. The attacker aims to recover content information of user s applications, such as keystrokes typed [26], [32], words spoken over VoIP [29], [30], and websites visited [2], [17], [4], [10]. These attacks can be quite effective, but defenses can, in turn, be quite expensive; e.g., cover traffic that hides the real underlying activities introduces significant performance overhead [20]. Most users are reluctant to deploy such defenses as they perceive the threat to be relatively limited: to perform traffic analysis, it is necessary to observe the patterns of packets. For a home user, this reduces the threat to those who are in physical proximity and can monitor their home network (perhaps wirelessly [24]) or those who have privileged access to the routers used by ISPs to route the traffic. We show that the threat is, in fact, much greater than previously considered. The design of Internet protocols gives attackers a mechanism to observe traffic patterns at routers remotely. In particular, by sending a low-bandwidth series of probe packets to a router, an adversary can create a side channel that leaks information about the size of the router s queue. This side channel conveys a surprising amount of information, even if the attacker s probes are sent from a vantage point that is geographically distant from the monitored host; e.g., in another state or another country. To demonstrate the power of this side channel, we develop a remote website fingerprinting attack. It allows an adversary to identify what websites a

2 2 home user is accessing knowing only the user s IP address. Our high-level goal is similar to previous work on website identification [2], [17], [4], [10]; however, because the side channel provides noisy information, we have to take a significantly different approach. Specifically, whereas previous work used summary statistics only for classification, we make use of the entire time series information obtained through traffic analysis. We address the problem of comparing time series, in the face of packet insertions and deletions, by using a dynamic time warping (DTW) distance, a signal processing technique previously developed for speech recognition. We then use the k-nearest neighbor (k-nn) algorithm to match the user s website to a library of previously collected time series. We evaluated our attack by recovering websites visited by a home user in Illinois. We were able to identify the website with 80% accuracy. The attacker probes were generated from vantage points in New Jersey, Seattle, and Quebec, Canada. We made use of commercial hosting services that cost as little as US$8 per month, showing that this attack is within easy reach of millions of people. The remainder of this paper is structured as follows. Section VI is an overview of related work. We explain our remote traffic analysis approach in Section II. In Section III, we present the website fingerprinting scheme. The implementation results of our attack are given in Section IV. Discussion of attack follows in Section V. Finally, we conclude in Section VII. II. REMOTE TRAFFIC ANALYSIS Traffic analysis attacks have been known to be effective for quite some time. And yet, for most Internet users, they represent a minor concern at best. Although a dedicated attacker could always intercept traffic by, say, bribing a rogue ISP employee, or tapping a switch box, he would run the risk of being caught and potentially incur criminal charges. In any case, this level of effort seems justified only for highly sensitive material, rather than casual snooping; therefore, as long as sensitive data are protected by encryption or other techniques, a user may feel relatively safe. We show, however, that traffic analysis can be carried out at a significantly lower cost, and by attackers who never come into physical proximity with the user. In fact, the attackers can launch their attacks from another state or country, as long as they have access to a well-provisioned Internet connection. This, in turn, is very easy to obtain due to the highly-competitive Internet hosting business sector: a virtual private server in a data center can cost as little as $8/month. 1 The attack traffic is very low rate, thus attackers do not need to incur high bandwidth costs, and, on the flip side, users who are being spied upon are unlikely to notice the small amount of performance overhead. Thus, anyone with a credit card can carry out the attack and leave nearly no trace. In this section, we describe our approach to remote traffic analysis; in the next section, we demonstrate how it can be used for remote website fingerprinting, effecting a real compromise to user privacy. A. Queuing Side Channel We will consider a home user, Alice, browsing a website via her DSL Internet connection. Unbeknownst to her, Bob, who is located in another state, or another country, uses his computer to send a series of ICMP echo requests (pings) to the router in Alice s house, 2 and monitors the responses in order to compute the round-trip times (RTTs). These RTTs will include in them queuing delays incurred on the incoming and outgoing DSL link to Alice s house, thus leaking information about the queue sizes on those links, which can in turn reveal traffic patterns for Alice. The question is, then, how much information is leaked by this channel? The probe packets traverse many Internet links, and the queuing delays on Alice s DSL link are but one component of the RTT. To investigate this question, we carried out a simple test with a home user in Illinois downloading the home page, while a computer in New Jersey sent ping request to the public IP address of the home user at a rate of 100 pings per second. The results are shown in Figure 2. Figure 2(a) plots the volume of the home user s real traffic binned into 10ms intervals. Figure 2(b) 1 See, for example, (retrieved in April 2010). 2 This is usually a wireless or wired router, implementing network address translation, but in some cases it might be Alice s PC itself.

3 3 queue Alice DSL router Illinois New Jersey Alice's ISP Bob's ISP Alice's traffic Bob's probe Bob Internet Traffic (byte) Time (s) (a) HTTP trace of Yahoo.com Fig. 1. Queueing side channel RTTs (s) plots the RTTs of the ping requests. We see that the RTTs are highly correlated with the HTTP traffic; whenever there is a large peak in the user s traffic, the attacker observer correspondingly large RTTs. It is interesting to observe the dramatic impact Alice s traffic has on the RTTs, compared to other variation. This can be explained by the dynamics of Internet traffic. Alice s DSL link is, by far, the slowest link that both her traffic and Bob s probe are likely to traverse. Furthermore, the intermediate routers are not likely to be very congested, as previous work shows that congestion is most likely to occur at edge links, rather than in the network core [16], [1]. We can observe this directly: when Alice s DSL link is idle, the RTT variation (jitter) is only one or two milliseconds. On the other hand, the queues at Alice s router can grow to be quite long (in relative terms), due to TCP behavior such as slow start that cause the server to send a batch of TCP packets at a fast rate. We can see that the additional delay caused by traffic at Alice s DSL line can be as high as 30ms. Thus, Alice s traffic patterns are clearly visible. We next discuss how we recover the traffic patterns, but first we discuss some of the requirements for the techniques to work well. These requirements are commonly met in home broadband installation, thus our analysis has broad applicability. B. Requirements No firewall. The probes use the ICMP protocol, so they could be blocked by a firewall on the Time (s) Processed RTTs (ms) (b) Observed RTTs Time(s) Fig. 2. (c) Processed RTTs Real traffic on a DSL vs. probe RTTs. home router. In a brief survey of consumergrade routers, we found that most of them do not perform ICMP filtering, at least not in the default configuration. Note that other forms of probes may be used as well; for example, if the home router exposes TCP ports for file sharing or other applications, SYN packets can be used with the same effectiveness. A single user. The probes cannot distinguish between the traffic of multiple users on the same link, so shared broadband connections present an obstacle to our attack. However, even in multi-user installations, it is still common for only one of them to be using the Internet at some point during the day. Additionally, previous work on traffic analysis has used blind source separation to separate traffic from

4 Fig Input/output relationship of a FIFO queue. multiple users [33]; similar techniques may be applicable here. Known IP address. Bob needs to know Alice s IP address to know where to send the probes. Although this mapping is typically only explicitly known to ISPs, many protocols, such as file sharing, instant messaging, VoIP, and , will reveal the IP address of a user. Other forms of IP address reconnaissance may be possible but outside the scope of this work. Limited bandwidth. The broadband link bandwidth must be low enough to introduce noticeable queuing delays. In our experiments, we have used speeds typical of current home broadband speeds several Mbps. The deployment of faster links, such as Fiber-to-the-Home (FTTH), will reduce the effectiveness of the queuing side channel. FIFO queuing. Most routers today do not use QoS extensions and thus schedule packets on a given link in FIFO order. A fair queuing implementation [25] would reduce the impact that cross-traffic would have on the probe sequence and hence reduce the effectiveness of the side channel, but not entirely eliminate it [14]. C. Traffic Pattern Recovery We model the incoming DSL link as a FIFO queue. For any FIFO queue the input/output relationship can be expressed as s i = D i max(d i 1, A i ), (1) where A i denotes the arrival time, D i the departure time, and s i denotes the service time (total amount of time the packet was being served) of packet i. Figure 3 clarifies the input/output relationship of Equation (1); because packet 2 arrives when packet 1 is still in the system, its total service time is s 2 = D 2 D 1. On the other hand, for both packets 1 and 3, the service time is s i = D i A i, as no other packet was being served when they arrived. In the case of our attack, arrival processes to Alice s DSL queue consist of two flows: the HTTP trace and the probe ping requests. Let A i be the time when the ith ping request packet P i arrives in the queue (i = 1, 2,...). After the router finishes serving all the packets in the queue before P i, P i will be served and arrive at the home user s router. The router will then generate a reply packet that will be delivered back to the probe origin. (As most traffic volume in an HTTP session occurs on the download side, we will ignore the queuing behavior on the outgoing link, though it could be modeled in a similar fashion.) The round trip time of the ith ping request measured by the attacker is given by rtt i D i A i + rtt, (2) where again D i denotes the departure time of P i from the queue. The first component D i A i represents the queuing delay experienced by the ping at the incoming DSL link. rtt models the propagation and processing delays experienced by the probe packets when there is no congestion; it can be estimated by the minimum RTT observed by the probes. As explained in II-A, the jitter from intermediate routers is quite small, thus we can ignore it in our model. As the ping packets have small sizes, most of the delay (i. e., D i A i ) is spent on waiting for the router to serve HTTP packets that have arrived before P i. Figure 4 shows one example of the above queuing system. In the arrival process, the ping packets (thin blocks) arrive in fixed intervals, and the HTTP packets (thick blocks) fall into these intervals. The router implements FIFO queuing scheme, where the serving times are proportional to packet sizes. Compared to the HTTP packets, most of which have maximal size (typically 1500 bytes), the transmission time of one ping packet is negligible. Combining Equations(1) and (2), we get the following recursive algorithm for recovery of traffic patterns from the RTT observations: A i = T ping i; (3) D i = rtt i rtt min + A i ; (4) rtt i = D i max(d i 1, A i ) (5)

5 5 A 1 A 2 A 3 A 4 A 5 D 1 D 2 D 3 D 4 Fig. 4. Queue system in the DSL router... T Arrival Process... T Departure Process where i is the ping sequence number, T ping is the time interval between two consecutive pings, rtt min is an approximated rtt i. The attacker first reconstructs the arrival and departure times of all ping packets, A i and D i, and then computes the delay incurred by unfinished HTTP packets arriving in the last period, rtt i, which is approximately proportional to the total packet sizes between pings P i 1 and P i. The accuracy of the estimation procedure above depends on the following two factors. Router Bandwidth. The bandwidth of the router determines the queue length and how fast the buffer is emptied. For a fixed ping frequency, if the router has a high bandwidth, more user packets will leave the buffer before the next ping request arrives. Hence, the attacker looses more information about user s traffic, resulting in a poorer estimation of the original traffic. Thus, the attacker is able to capture more information about user s packets when the router has a lower bandwidth. Probe Frequency. The attacker s probes take a period snapshot of the length of the queue. The ping frequency, therefore, affects the amount of information. The more frequently the attacker sends the ping requests, the less user packets he will miss. To improve the estimation accuracy, the attacker should sends the probes as frequently as possible. Theoretically, the attacker can capture every single HTTP packet if the MT Usize ping period is chosen to be less than, bandwidth but the increase in the bit rate of probe signals may expose the attacker. Therefore, to improve the estimation accuracy, the attacker should choose a probe frequency compatible with the router s processing speed. We will see how these two factors affect the traffic analysis performances in Section IV. To sum up, the attacker processes the RTTs of ping requests and computes a time series estimate of user s arrival process. Next, we show how to extract a classification feature from this time series to perform the website fingerprinting attack. III. WEBSITE FINGERPRINTING Previous work on traffic analysis has shown that it is often possible to identify the website that someone is visiting based on traffic timings and sizes [17], [11], even if the website connection is carried over an encrypted tunnel to a proxy that hides the true destination (such as Tor [8]). We show that we can use remote traffic analysis to perform the same attack without observing the user s traffic directly. As compared with the previous work, using remote traffic analysis for website fingerprinting introduces two additional challenges. First, previous work created a training set for classification purposes from the same vantage point that was then used for fingerprinting. An attacker performing remote traffic analysis must, of course, use a different environment for collecting the training set, potentially affecting the measured features. Second, previous work used exact packet size distributions to create features, whereas this information is not readily available to the attacker, since smaller packets are unlikely to produce noticeable queuing delays. We describe our approach to solving these two problems next. A. Training Environment To obtain an accurate fingerprint for traffic of a particular user, the attacker must be able to replicate the network conditions on that user s home network. The approach we used was to set up a virtual machine running a browser that is connected to the Internet via a virtual Dummynet link [22]. The virtual machine is then scripted to fetch a set of web pages of interest; at the same time, a probe is sent across the Dummynet link, simulating the attack conditions. The processed RTTs from the

6 6 probe are then added to a database for classification (see below). The link has a number of parameters that affect the fingerprint. We found that most important parameter to replicate was the link bandwidth. As discussed in II-C, the probe frequency should be adjusted based on the available bandwidth. Bandwidth also affects the magnitude of the queuing delays; additionally, it can significantly alter the traffic pattern, as TCP congestion control mechanisms are affected by the available bandwidth. Fortunately, estimating available bandwidth on a link is a wellstudied problem [27], [19], [21]. In our tests, we used a packet-train technique by sending a burst of probe packets and measuring the rate at which responses were returned and found that the results were reasonably accurate. The round-trip time between the home router and the website also affects the fingerprint; however, we found that this did not have a large impact on the classification accuracy and thus did not explicitly model this parameter. We note, however, that the round-trip time is relatively easy to estimate from a trace: in the earlier section of Figure 2(b), it is easy to see the TCP slow-start behavior, as exponentially larger bursts of packets are sent. These bursts will be spaced one RTT apart and can therefore be used to tune the training data. Many other factors affect the fingerprint, such as the web browser used, operating system, CPU speed, available memory, etc. We found, however, that we were able to obtain good success rates without modeling this behavior more explicitly. B. Dynamic Time Warping To deal with the fact that the queuing side channel is more noisy than with direct observation, we developed a classification strategy that uses all of the information obtained from the training set, rather than summary statistics. We can model the RTT observations as a marked point process, where each ping time is annotated with the corresponding RTT. To simplify analysis, we pre-process this data and keep only those points where the RTT has a significant increase from the previous observation. This corresponds to new traffic arriving at the queue between two pings. As the queue drains at a constant rates, pings from periods when no new traffic arrived provide no new information. After processing both the training set and the observed RTTs in this way, our goal is to find the best match between the observation and the training set. The challenge is to define a meaningful distance between marked point processes. Note that pointwise comparisons will produce poor results, since some traces will have some observations missing, and the point processes will quickly become out of sync. Aligning two point processes by time values is equally error prone, as the delays between packets do not follow a strict pattern and have a large amount of variation. To solve this problem, we turn to the Dynamic Time Warping (DTW) distance [23]. DTW was developed for use in speech processing to account for the fact that when people speak, they pronounce various features of the phonemes at different speeds, and do not always enunciate all of the features. DTW attempts to find the best alignment of two point processes by creating a non-linear time warp between the sequences. Consider marked point processes: A = {a 1, a 2..., a I } and B = {b 1, b 2..., b J }. To visualize the difference between these series consider an plotting one against the other as depicted in Figure 5. Let function F (c) = {c(1),..., c(k)} be a mapping from point process A to point process B or c(k) = (c(i), c(j)). For any such a function, we can define the distance d(c) = d(i, j) = a i b j. Furthermore, a weighted time normalized distance of A and B can defined by D(A, B) = min F { K } k=1 d(c(k))w(k) K k=1 w(k), (6) where the weights w(k) are nonnegative coefficients intended to make the definition of distance D(A, B) more flexible. To make the optimization problem of (6) tractable, the weights are chosen independent of warping function F (c) and assumed to sum up to a constant or K k=1 w(k) = N. Thus, the calculation of distance of (6) is reduced to { K } D(A, B) = min d(c(k))w(k) F k=1

7 7 B b J b 1 Fig. 5. a 1 c(3) = (2, 3) Warp c(k) =(I,J) Warping function example Depending on the application of interest, some proper restrictions are imposed on warping function F. One example of the restrictions imposed on the matching of the sequences is on the monotonicity of the mapping in the time dimension. Dynamic programming can be used to find the distance D(A, B). C. k-nearest Neighbor Algorithm We find the match site for the test sample using the k-nearest Neighbor (k-nn) algorithm. k-nn is a simple type of instance-based learning commonly used in pattern recognition and machine learning [6]. Test samples are classified based on most similar training samples in the feature space, namely neighbors. The decision rule for one test sample is based on majority votes of its neighbors; the test sample is matched to the class most common amongst the k nearest neighbors. The neighbor number k is a positive integer (usually small odd integers). When k = 1, it becomes nearest neighbor algorithm. Increasing k can reduce the effect of noise in training samples minimum distance decoding, but the boundaries between different classes becomes less distinct. The best choice of k depends on the specific problem and test data. We try different k values and choose the best one through experiments. A. Experimental Set Up IV. EVALUATION Our experiments involves three systems: a target system, the attack system, and the training testbed. The target system is a PowerBook G4, located a I A in Illinois, connected to a DSL line with 3 Mbps download and 512 Kbps upload speeds. We used a shell script to automatically browse websites using Firefox To focus on user traffic generated by browsing single website, we disable the browser cache, automatic update checks, and unnecessary online plugins. Also, we make the browser only opens one website at a time. We used several commercial hosting sites for the attack server, located in New Jersey, Seattle, and in the Canadian province of Quebec, with the results presented in the graphs. We used hping 4 to schedule pings at precise time intervals, based on the measured router bandwidth. We then analyzed the RTTs from a packet trace recorded via tcpdump 5. The testbed is a Linux machine located in our lab running several VMWare instances: a virtual target that is scripted to browser websites, similar to the real target, a virtual router providing NAT service, and a dummynet link configured to act as a bandwidth bottleneck. We used hping to send probes from the host O/S to the virtual NAT router. This provided very clean data for the training set, as there is no additional noise added by intermediate routers. Note that, in practice, the same machine can be used for both the testbed and the attack server; however, we wanted to use rented machines for attacks to provide distance vantage points. Following are main parameters related to our performance. We vary their values in the tests and discuss about the resulting classification performances. s is the size of our training sample set. We collect at most 50 samples for each website in the training stage. The default value for s is 50. N is the number of websites considered in classifications. We consider 30 most popular websites. k is the number of closest neighbors in k-nn algorithm. We choose a series of odd integers to find the best k for the attacker. bw is the bandwidth of the DSL router. The bandwidth in our test is 3 Mbps. We will study the attack performance under different bandwidths in a virtual machine setup

8 k=1 k= training set size = 50 training set size = 20 training set size = Detection rate Detection rate Training set size The nearest neighor number k Fig. 6. Accuracy of varying training set size Fig. 7. Accuracy of varying k T ping is the time interval between two pings. With the router bandwidth to be 3 Mbps, we set the default value of T ping to be s. B. Testbed Results We first tune the parameters for our attack by using the testbed to provide both the training and the target traces. The attacker can achieve about 80% detection accuracy to classify 30 websites by sending ping requests every 0.005s. We see the performances under different values of N, s, and k. We first fix N = 30, T ping = 0.005s, bw = 3 Mbps, and change the training set size s. Figure 6 depict the results for k = 1 and 3. We see that in both cases more training samples result in better classification accuracy. This is because the effect from noisy samples in the training set is reduced as we increase the total training set size. Notice that the accuracy goes from 40% to 70% for k = 1, and from 60% to 80% for k = 3. The difference indicates that the increasing k can also reduce affect of the noise training samples. However, as we show later, larger values of k do not uniformly perform better. We fix N = 30, T ping = 0.005s, bw = 3Mbps, and change the value of k. Figure 7 depict the results when s = 10, 20 and 50. As we choose larger k, the classification accuracies all first increases and then decrease. As discussed above, at the beginning larger k will eliminate noises in training sample. However, when the k continues to increase, the boundary between classes becomes blurred, which explains the decreasing accuracy in Figure 7. As the Detection rate k=3 k= Number of websites Fig. 8. Accuracy of varying k accuracy peaks at k = 3, we set this value for k in our tests. Next, we fix T ping = 0.005s, bw = 3Mbps, s = 50, vary N from 5 to 30. The results are depicted in Figure 8. The classification performance gets poorer when more websites are considered. The accuracy is about 90% when only classifying 5 websites, and decreases to below 80% when classifying 30 websites. This is expected because in hypothesis testing, for fixed sample size (s=50), the error probability increases as the number of hypotheses increases. We notice that the accuracy of k = 1 is higher at N = 5. C. Router Bandwidth and Ping Frequency The accuracy of the traffic pattern estimation depends on the router bandwidth and ping sending frequency. In this section, we show the classification performance under different values of these two parameters. We fix N = 10, bw = 3 Mbps, s = 50,

9 9 Detection rate The ping interval (s) Fig. 9. Effect of ping intervals TABLE I ACCURACY OF VARYING BANDWIDTH Bandwidth ping interval Accuracy 1 ms 98.64% 3 Mbps 3 ms 88.64% 5 ms 81.09% 1 ms 98.18% 5 Mbps 3 ms 73.64% 5 ms 70.45% 1 ms 85.91% 10 Mbps 3 ms 66.82% 5 ms 30.00% TABLE II CLASSIFICATION ACCURACY and increase the ping interval from s. The result is depicted in Figure 9. The detection rate drops from about 90% at T ping = 0.003s to 20% at T ping = 0.08s. The poorer classification performance is expected because the attacker fails to observe patterns due to coarse sampling. For the router in our test, the attacker needs to send the probes every 1500byte = 0.004s to capture every 3Mbps user packet. This also explains the high detection accuracy at low ping intervals depicted in Figure 9. Next, we show how the router s bandwidth affects the results. We use virtual machines to construct a virtual router with adjustable bandwidths. The results are given in Table I. We see that with the same ping interval, the accuracy decreases as the bandwidth increases. D. Target System Results We evaluate the classification accuracy of our website fingerprinting attack by obtaining test data from the target system connected by a DSL line and using the virtual machine testbed to collect a training set tuned with the same bandwidth parameters. We also consider matching a trace from the DSL scenario against other traces collected at the DSL computer; likewise for the virtual machines. This allows us to differentiate between the impact of having an adequately tuned training environment and of the noise introduced by the queuing side channel. The results are shown in Table II. We see that, when the same computer is used for collecting training and test data, the classification results are very good. The results are comparable with the success rates of previous work, showing that the N Training Test Accuracy VM VM 84.21% 12 DSL DSL 81.25% VM DSL 36.81% VM VM 80.26% 24 DSL DSL 82.64% VM DSL 21.53% queuing side channel is an effective way to perform traffic analysis. When testing the DSL traffic against the VM training set, we get significantly worse results, although our classification rates are much higher than would be expected from random classification (8% for 12 websites and 4% for 24). We expect that, with further tuning of the testbed architecture, the accuracy can be improved. Some degradation, on the other hand, may be inherent to using multiple vantage points, as is discussed in V-B. V. DISCUSSION A. Privacy preserving router policies The basis of our remote traffic analysis is presence of the queuing side channel, therefore countermeasures to our attack must seek to mitigate this side channel. We have shown that the router may leak most of the user traffic information using FCFS policy. This is because a large correlation exists between user s arrival process and attacker s RTTs. To counter our attack, the router could employ a scheduling policy, which produces low correlation between the two incoming traffic flows. However, design of such a policy is not trivial. We evaluate some existing policies, namely Round-Robin and TDMA policies.

10 10 TABLE III DETECTION RATE WITH DIFFERENT POLICIES Router policy Detection accuracy Average delay FCFS 81.09% 0.445s Round-Robin 78.00% 0.457s TDMA 17.00% 2.61s The simulation results are presented in Table III. In the simulation, N = 10, t = 0.003s, s = 50, and k = 3. We see the classification results of both policies are poorer than FCFS. In the round-robin case, the packets from user and attacker are served alternately, so the ping only needs to wait for at least one user packet in the buffer. Hence, the queuing evolution resulting from user s activity conveys less information than in the FCFS case. From the results in the table, we see the classification accuracy is lower than FCFS, but still quite high, around 70%, much higher than uniformly random pick (10%). For TDMA, the router s service time is equally allocated to the user and attacker, hence the correlation between their traffic is extremely low, which means the attacker learns nothing. This is verified by the simulation results in Table III, where TDMA gives a detection accuracy around 20%. However, TDMA causes large delays, and exact slot allocation policy can be challenging to implement for a dynamic packet network. Hence, the tradeoff between packet delay and information leak is important issue in designing practical router policies to preventing our attack. B. Dynamic Websites Our attack relies on web sites having a relatively stable fingerprint. We note that, even for dynamic websites, the overall pattern captured by our RTT probes remains static enough to obtain good classification results. Website content also changes over time, and with it the traffic patterns. We note that our technique is less sensitive to small changes in content, as we do not rely on exact packet sizes; however, large changes (e.g., site redesigns) will result in new patterns being discovered. Thus, for best results, the training set should be collected close in time to the probe. Note that, since the collection occurs in a testbed controlled by the attacker, collecting new data at any time is not a problem. Websites that use content distribution networks (CDNs) will use different servers to deliver content based on the user s location. They may also present localized versions of the site to users in different countries or regions. As shown in our experimental results, this can cause fingerprints to differ significantly. If identifying these sites is a high priority for the attacker, additional work would be needed to obtain fingerprints of the right version by, for example, using proxies and other techniques to fool IP-based localization. VI. RELATED WORK The idea of remote traffic analysis using probes has been previously explored in context of exposing identity of Tor relays participating in a given circuit. Murdoch and Danezis implemented one such attack against Tor and MorphMix [18]. Their approach was to send an on-off pattern of high-volume traffic through the anonymous tunnel and a low-volume probe to a router under test. If the waiting times of the probe show a corresponding increase during the on periods, the router is assumed to be routing the flow. However, Murdoch and Danezis s attack was performed on only a 13-relays lightly loaded Tor network and it was not practical on today s 1500-relay heavily loaded Tor network. Even ignoring the growing false positive rates resulting from possible increases in traffic load due to legitimate uses during attacker s on period, the attacker needs extremely large amount of bandwidth to measure enough relays during the attack window. Evans et al. [9] strengthened Murdoch and Danezis s attack of by a bandwidth amplification attack which make their attack feasible in modern-day deployment of Tor. By combining JavaScript injection with a selective and asymmetric denial-of-service (DoS) attack, Evans et al. were able to infer specific information about the path selected by the victim and thus circumvent Murdoch and Danezis s attack. Hopper et al. [13] use a combination of Murdoch and Danezis s approach and pairwise round trip times (RTTs) between Internet nodes to correlate Tor nodes to likely clients. Chakravarty et al. [3] propose an attack for exposing Tor relays participating in a circuit of interest by modulating the bandwidth of an anonymous connection and then observing

11 11 the fluctuations as they propagate through the Tor network. We survey previous work on probing HTTP traffic in the literature. The objective of these attacks is to identify the website a user is browsing, namely fingerprinting websites. Website fingerprinting procedure often entails a training stage, where the attacker extracts certain features from training HTTP traces and makes a profile for every website containing its feature information. In this way, the attacker can build a database containing profiles of all websites of interest. In the test stage, when user is browsing a website, the attacker analyzes features in the download flow, and classifies it into the most similar profile in the database. Following this framework, the difference in the literature is often in the chosen features or the classification algorithms. Cheng et al. [5] present one of the earliest website fingerprinting approach. The classification features used in their scheme are the object sizes and the HTML file sizes. This attack is impractical for two reasons. first, the attacker needs to access the target website and record the sizes of all objects and references when building the page profile database; second, it is infeasible to detect the size of individual object in HTTP traces if connection pipelining (supported in HTTP 1.1) or tunnel-based encryption tools (e.g., WEP/WPA links and SSH tunnels) is used; moreover, this attack is constrained to one single web server, hence is less powerful than later schemes, which consider identification of a larger number of candidate websites. Hintz [12] and Sun et al. [28] both consider website fingerprinting attacks in SSL encrypted HTTP connections. Their classification features are object sizes and counts. While Hintz did not present implementation details and experiment results, Sun et al. use a Jaccard s coefficient based classifier and show that their attack can achieve a correct identification rate of 75 %. Like Cheng, they assume that individual web objects in one transmission can be separated by examining the timing of TCP connections. Hence, the attack becomes infeasible if user applies connection pipelining or tunnel-based encryptions. Instead of looking at web objects, Bissias et al. [2], Liberatore et al. [17], and Herrmann et al. [11] study the statistical characteristics of individual packets in the traffic flows. Bissias et al. use packet sizes and inter-arrival timings as classification features. Their method is fragile to the changes in the network environment, as the inter-arrival timing is highly dependent on the specific routing path and varies from time to time. To address this problem, Liberatore et al. only use packet sizes and counts in classification. They implement both Jaccard coefficient and Naive Bayes classifier, and show the efficacy of the attack in practice. Using similar scheme, Herrmann et al. further improve the classification accuracy using Multinomial Naive Bayes classifier. Using these packet-based fingerprinting methods, the attacker can identify the target HTTP connection at over 80% detection accuracy. Summing up, if the attacker can capture user s HTTP traffic traces, he can infer the websites user is browsing by analyzing statistical information, such as packet sizes and counts. In many cases, however, the attacker has no direct access to the target traffic flows. For instance, the attacker may be in a different state or country from the user. In this case, all the schemes above, belonging to the category of local traffic analysis, become infeasible. Next, we present a scheme that allows the attacker to infer user s HTTP traffic pattern using a low-bit sequence of probes. Our scheme uses standard website fingerprinting framework. However, the attacker does not have either size or timing information of user packets. Instead, we use a recovered time series pattern as our classification features. We compute similarity between samples with a DTW metric, and make classification decisions in a k-nearest neighbor manner. VII. CONCLUSION We show that traffic analysis attacks can be carried out remotely, without access to the analyzed traffic, thus greatly increasing the attack surface. We identify a queuing side channel that can be used to infer the queue size of a given link with good accuracy and thus monitor traffic patterns. We show how this channel can be used to carry out remote website fingerprinting and identify a remote user s browsing patterns. This highlight the importance of traffic analysis attacks in today s connected Internet.

12 12 REFERENCES [1] A. Akella, S. Seshan, and A. Shaikh. An empirical evaluation of wide-area internet bottlenecks. In Internet Measurement Comference, pages , [2] G. Bissias, M. Liberatore, D. Jensen, and B. Levine. Privacy vulnerabilities in encrypted HTTP streams. In Privacy Enhancing Technologies, pages 1 11, [3] S. Chakravarty, A. Stavrou, and A. Keromytis. Identifying proxy nodes in a tor anonymization circuit. In Signal Image Technology and Internet Based Systems, SITIS 08. IEEE International Conference on, pages , dec [4] S. Chen, R. Wang, X. Wang, and K. Zhang. Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow. In Proceedings of IEEE Symposium on Security and Privacy (Oakland), [5] H. Cheng,, H. Cheng, and R. Avnur. Traffic analysis of ssl encrypted web browsing, [6] T. M. Cover and P. E. Hart. Nearest neighbor pattern classification. IEEE Transactions on Information Theory, 13:21 27, [7] T. Dierks and C. Allen. The TLS protocol version 1.0. RFC2246, Jan [8] R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In In Proceedings of the 13th USENIX Security Symposium, pages , [9] N. Evans, R. Dingledine, and C. Grothoff. A practical congestion attack on Tor using long paths. In 18th USENIX Security Symposium, pages 33 50, [10] D. Herrmann, R. Wendolsky, and H. Federrath. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na ıve-bayes classifier. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages ACM, [11] D. Herrmann, R. Wendolsky, and H. Federrath. Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier. In ACM Cloud Computing Security Workshop, [12] A. Hintz. Fingerprinting websites using traffic analysis. In Workshop on Privacy Enhancing Technologies, [13] N. Hopper, E. Y. Vasserman, and E. Chan-tin. How much anonymity does network latency leak. In In CCS 07: Proceedings of the 14th ACM conference on Computer and communications security. ACM, [14] S. Kadloor, X. Gong, N. Kiyavash, T. Tezcan, and N. Borisov. Low-cost side channel remote traffic analysis attack in packet networks. In IEEE International Conference on Communications, [15] S. Kent and R. Atkinson. RFC2401: security architecture for the Internet protocol. RFC Editor United States, [16] K. Lakshminarayanan and V. N. Padmanabhan. Some findings on the network performance of broadband hosts. In nternet Measurement Comference, pages 45 50, [17] M. Liberatore and B. N. Levine. Inferring the source of encrypted HTTP connections. In CCS 06: Proceedings of the 13th ACM conference on Computer and communications security, pages , New York, NY, USA, ACM Press. [18] S. J. Murdoch and G. Danezis. Low-cost traffic analysis of tor. In SP 05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages , Washington, DC, USA, IEEE Computer Society. [19] R. Prasad, C. Dovrolis, M. Murray, and K. Claffy. Bandwidth estimation: metrics, measurement techniques, and tools. IEEE network, 17(6):27 35, [20] J. Raymond. Traffic analysis: Protocols, attacks, design issues, and open problems. In Designing Privacy Enhancing Technologies, pages Springer, [21] V. Ribeiro, R. Riedi, R. Baraniuk, J. Navratil, and L. Cottrell. pathchirp: Efficient available bandwidth estimation for network paths. In Passive and Active Measurement Workshop, volume 4. Citeseer, [22] L. Rizzo. Dummynet: a simple approach to the evaluation of network protocols. ACM SIGCOMM Computer Communication Review, 27(1):31 41, [23] H. Sakoe and S. Chiba. Dynamic programming algorithm optimization for spoken word recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing, 26:43 49, [24] T. Saponas, J. Lester, C. Hartung, S. Agarwal, T. Kohno, et al. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In Usenix Security, volume 3, page 3, [25] M. Shreedhar and G. Varghese. Efficient fair queueing using deficit round-robin. IEEE/ACM Transactions on Networking (TON), 4(3):385, [26] D. X. Song, D. Wagner, and X. Tian. Timing analysis of keystrokes and SSH timing attacks. In USENIX Security Symposium, [27] J. Strauss, D. Katabi, and F. Kaashoek. A measurement study of available bandwidth estimation tools. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, pages ACM, [28] Q. Sun, D. R. Simon, Y.-M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In IEEE Symposium on Security and Privacy. Society Press, [29] C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In IEEE Symposium on Security and Privacy, pages 35 49, [30] C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In SP 08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 35 49, Washington, DC, USA, IEEE Computer Society. [31] T. Ylonen and C. Lonvick. Internet draft - ssh transport layer protocol. March [32] K. Zhang and X. Wang. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In USENIX Security, [33] Y. Zhu and R. Bettati. Unmixing mix traffic. In Privacy Enhancing Technologies, pages Springer.

Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis

Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis Traffic Analysis Scott E. Coull RedJack, LLC. Silver Spring, MD USA Related Concepts and Keywords Side-channel attack, information theory, cryptanalysis, covert channel analysis Definition Traffic analysis

More information

Privacy Vulnerabilities in Encrypted HTTP Streams

Privacy Vulnerabilities in Encrypted HTTP Streams University of Massachusetts - Amherst ScholarWorks@UMass Amherst Computer Science Department Faculty Publication Series Computer Science 2005 Privacy Vulnerabilities in Encrypted HTTP Streams George Dean

More information

Internet Anonymity and the Design Process - A Practical Approach

Internet Anonymity and the Design Process - A Practical Approach anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, mwright@uta.edu,

More information

Bandwidth Measurement in Wireless Networks

Bandwidth Measurement in Wireless Networks Bandwidth Measurement in Wireless Networks Andreas Johnsson, Bob Melander, and Mats Björkman {andreas.johnsson, bob.melander, mats.bjorkman}@mdh.se The Department of Computer Science and Engineering Mälardalen

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish

Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish Tor Anonymity Network & Traffic Analysis Presented by Peter Likarish This is NOT the presenter s original work. This talk reviews: Tor: The Second Generation Onion Router Dingledine, Mathewson, Syverson

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Information Leakage in Encrypted Network Traffic

Information Leakage in Encrypted Network Traffic Information Leakage in Encrypted Network Traffic Attacks and Countermeasures Scott Coull RedJack Joint work with: Charles Wright (MIT LL) Lucas Ballard (Google) Fabian Monrose (UNC) Gerald Masson (JHU)

More information

Performance Comparison of low-latency Anonymisation Services from a User Perspective

Performance Comparison of low-latency Anonymisation Services from a User Perspective Performance Comparison of low-latency Anonymisation Services from a User Perspective Rolf Wendolsky Hannes Federrath Department of Business Informatics University of Regensburg 7th Workshop on Privacy

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Examining Proxies to Mitigate Pervasive Surveillance

Examining Proxies to Mitigate Pervasive Surveillance Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Detecting Denial of Service Attacks in Tor

Detecting Denial of Service Attacks in Tor Detecting Denial of Service Attacks in Tor Norman Danner, Danny Krizanc, and Marc Liberatore Department of Mathematics and Computer Science Wesleyan University Middletown, CT 06459 USA Abstract. Tor is

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Cellular and 802.11 Networks Application and Data Usage

Cellular and 802.11 Networks Application and Data Usage Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

An overview on Internet Measurement Methodologies, Techniques and Tools

An overview on Internet Measurement Methodologies, Techniques and Tools An overview on Internet Measurement Methodologies, Techniques and Tools AA 2012/2013 emiliano.casalicchio@uniroma2.it (Agenda) Lezione 24/04/2013 Part 1 Intro basic concepts ISP Traffic exchange (peering)

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

VPN Technologies: Definitions and Requirements

VPN Technologies: Definitions and Requirements VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Introduction, Rate and Latency

Introduction, Rate and Latency Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Denial of Service Attacks and Resilient Overlay Networks

Denial of Service Attacks and Resilient Overlay Networks Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University Motivation: Network Service Availability Motivation:

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

How A V3 Appliance Employs Superior VDI Architecture to Reduce Latency and Increase Performance

How A V3 Appliance Employs Superior VDI Architecture to Reduce Latency and Increase Performance How A V3 Appliance Employs Superior VDI Architecture to Reduce Latency and Increase Performance www. ipro-com.com/i t Contents Overview...3 Introduction...3 Understanding Latency...3 Network Latency...3

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks Rungrat Wiangsripanawan, Willy Susilo and Rei Safavi-Naini Center for Information Security School of Information

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage

Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage UCSD MIT UCSD UCSD Today s talk in one slide Third-party

More information

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Encrypting Network Traffic

Encrypting Network Traffic Encrypting Network Traffic Mark Lomas Computer Security Group University of Cambridge Computer Laboratory Encryption may be used to maintain the secrecy of information, to help detect when messages have

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations

Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations C. Wright, L. Ballard, S. Coull, F. Monrose, G. Masson Talk held by Goran Doychev Selected Topics in Information Security and

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Tranzeo s EnRoute500 Performance Analysis and Prediction

Tranzeo s EnRoute500 Performance Analysis and Prediction Tranzeo s EnRoute500 Performance Analysis and Prediction Introduction Tranzeo has developed the EnRoute500 product family to provide an optimum balance between price and performance for wireless broadband

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

LES: Layered Encryption Security

LES: Layered Encryption Security LES: Layered Encryption Security Manish Karir John S. Baras Center for Satellite and Hybrid Communication Networks Department of Electrical and Computer Engineering & Institute for Systems Engineering

More information

Video Streaming with Network Coding

Video Streaming with Network Coding Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,

More information

HMM Profiles for Network Traffic Classification

HMM Profiles for Network Traffic Classification HMM Profiles for Network Traffic Classification Charles Wright, Fabian Monrose and Gerald Masson Johns Hopkins University Information Security Institute Baltimore, MD 21218 Overview Problem Description

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE

THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Remote Path Identification using Packet Pair Technique to Strengthen the Security for Online Applications R. Abinaya PG Scholar, Department of CSE, M.A.M

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

MEASURING WIRELESS NETWORK CONNECTION QUALITY

MEASURING WIRELESS NETWORK CONNECTION QUALITY Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

Challenges of Sending Large Files Over Public Internet

Challenges of Sending Large Files Over Public Internet Challenges of Sending Large Files Over Public Internet CLICK TO EDIT MASTER TITLE STYLE JONATHAN SOLOMON SENIOR SALES & SYSTEM ENGINEER, ASPERA, INC. CLICK TO EDIT MASTER SUBTITLE STYLE OUTLINE Ø Setting

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

Content Distribution Networks (CDN)

Content Distribution Networks (CDN) 229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Wide Area Network Latencies for a DIS/HLA Exercise

Wide Area Network Latencies for a DIS/HLA Exercise Wide Area Network Latencies for a DIS/HLA Exercise Lucien Zalcman and Peter Ryan Air Operations Division Aeronautical & Maritime Research Laboratory Defence Science & Technology Organisation (DSTO) 506

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information

Web Browsing Quality of Experience Score

Web Browsing Quality of Experience Score Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

High Performance VPN Solutions Over Satellite Networks

High Performance VPN Solutions Over Satellite Networks High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,

More information

Path Optimization in Computer Networks

Path Optimization in Computer Networks Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Effects of Interrupt Coalescence on Network Measurements

Effects of Interrupt Coalescence on Network Measurements Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,dovrolis@cc.gatech.edu Abstract. Several

More information

VoIP Reliability in Managed Service Deployments

VoIP Reliability in Managed Service Deployments 1 VoIP Reliability in Managed Service Deployments Technical White Paper Introduction This White Paper introduces the Aspen 365 family of network appliances and explains how service providers offering a

More information

The ISP Column A monthly column on all things Internet

The ISP Column A monthly column on all things Internet The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question

More information

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques

More information

Optimizing Converged Cisco Networks (ONT)

Optimizing Converged Cisco Networks (ONT) Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS Introducing QoS Objectives Explain why converged networks require QoS. Identify the major quality issues with converged networks.

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24 Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key

More information