Sabbia: a low-latency design for anonymous networks
|
|
|
- Tracey Robinson
- 10 years ago
- Views:
Transcription
1 Sabbia: a low-latency design for anonymous networks Claudio Agosti 1 and Stefano Zanero 2 1 Sikurezza.org research group [email protected] 2 DEI-Politecnico di Milano, via Ponzio 34/ Milano Italy [email protected] Abstract. We present Sabbia, a novel approach for building a low latency anonymous network. Sabbia is characterized by a simple design which offers a perfect forward anonimity to internet traffic, using normal, user-space software. Sabbia is based on natural network concepts to optimize routing, a steganographic approach for data hiding which does not heavily impact performance, and uses expert algorithms and protocol dissection at application layer in order to solve automatically some well-known security problems. 1 Introduction The Internet is growing up, from its early stages of experimentation to widespread and ubiquitous usage. New problems are thus arising due to the different needs of its different user communities. Since the Internet is becoming an area where significant amounts of money can be made and lost, information exchange and free speech, which were the true innovation behind the first age of the net, are now threatened by information censorship, sometimes openly declared, sometimes more sneaky. Protecting these fundamental rights is the real motivation behind research into privacy, secrecy and anonymity preserving technologies. Anonymous networks have been widely studied in the past, and can be divided in a rough taxonomy as follows: 1. High latency anonymous networks, e.g. MixMinion [1] and MixMaster [2], used for non interactive data block (such as transfer) 2. Closed anonymous networks, e.g. FreeNet [3] 3. Low latency anonymous networks, used for anonymous interactive sessions like web navigation, remote administration, and instant messagging Our study focuses on low latency anonymous networks. The state of art for this type of networks is described in TOR [4], but some questions and problems 1 This work was partially supported by the Italian FIRB-Perf project. The authors wish to thank Michele Mazzucchi for his help in proofreading the text.
2 are left open. In this paper, we examine these open issues and propose a new architecture, named Sabbia ( sand in Italian), which aims to solve them. In anonymous networks, each of the peers must offer its own address as a temporary shield to other participants. One of the unique characteristics of Sabbia is the ability, for each peer in the network, to choose exactly how much bandwidth it is willing to donate for this purpose. In addition, Sabbia s design has been heavily influenced by social network studies [5], trying to emulate some charateristics of the social network which can help in optimizing the anonymous network. Usually, the number of hops is proportional to the security of the network, and thus also proportional to the loss of perfomance: Sabbia uses social networks concepts in order to minimize the length of the anonymous path to reach a specific destination. The paper is organized as follows: in Section 2 we analyze related works, in particula TOR. We describe both the benefits that this architecture brings, and the questions left open in TOR design. In Section 3 we analyze end user and developer requirements, in order to design a protocol which is both easy to implement and to use. We analyze usability, required features, underlying design assumptions, security and considerations about the extensibility of our design. In Section 4 we describe the network architecture and show how it has been inspired by natural networks. In Section 5 we describe the architecture of the Sabbia protocol, providing multilayer anonymity and safe forwarding with optimized path discovery. In Section 6 we analyze known active and passive attacks, and show how the Sabbia protocol protects the user against them. Finally, in Section 7 we draw some conclusions and outline our future work on the subject. 2 Related Work and open questions The concept of data anonimization through cryptography and forwarding was originally introduced by Chaum [6]. His work laid out the foundation of anonymous r er technology, the most stable anonymization technoloy deployed on the Internet: they hide the relationship between sender and recipient by wrapping messages in multiple layers of public-key cryptography, and delivering them through a path of relays (mixes) which, in turn, decrypt, delay, and re-order messages before relaying them. After his original work, two newer generations of r ers ensued: Mixmaster [2] and later Mixminion [1], the latter being the state of the art technology in use nowadays. The first pseudo-anonymous r er (known by its hostname as anon.penet.fi ) simply stripped headers and user informations from s, r ing them and waiting for an answer to send back to the user. In a similar way, the first low-latency anonymous network available was a single hop anonymizing proxy: Anonymizer. These systems shared the same defect: an attacker able to see incoming and outgoing traffic would be able to correlate requests with the sources. This is called a passive attack because the attacker just needs to observe the traffic, as opposed to active attacks, where the attacker needs to be able to mangle traffic inside the network.
3 As we said, anonymizers use multiple layers of public key encription to avoid traffing interception and the insertion of potentially untrusted mixes into the path, and introduce large, variable forwarding delays to avoid traffic correlation attacks. These techniques make high-latency system solidly safe. However, low-latency systems can not deploy such techniques, because they require a bidirectional, interactive exchange of data. They are consequently vulnerable to various types of attacks. JAP, the Java Anon Proxy, which uses an encrypted chain forwarding hop and fake payload adding, is vulnerable to passive and active attacks exposed in [7]. The same paper finds out PipeNet [8] to be vulnerabile to a catastrophic Denial of Service attack. The authors propose then a modification of the forwarding techniques in order to twarth the attacks they detected. Distributed-trust, circuit-based anonymizing systems are more complex. In these designs, a user establishes one or more bidirectional circuits, and tunnels data in fixed-size cells. Circuits are tipically established through public-key cryptography, whereas cells are transmitted using symmetric encryption. Because a circuit crosses several servers, and each server only knows the adjacent servers in the circuit, no single server can link a user to her communication partners. Tarzan [9] and MorphMix [10] are peer-to-peer networks, where participants both generate and relay traffic for others, in order to hide who actually generated traffic as opposed to simply relayed it. This is a good solution, even if not perfect, however it requires peers to offer their bandwidth to others, and if not limited in some way, this could quickly saturate the link of a peer with unwanted traffic. Cebolla [11] and Rennhard s Anonymity Network [12] use instead a layered onion of public-key encrypted messages, each layer of which provides session keys and the address of the next server in the circuit. But as it was shown in [13] both peer-to-peer and onion networks share the vulnerable concept of a chain of servers, and a passive attacks on an anonymous chain may reveal the original sender of an anonymous connection, even if it is rebuilt and reencryptet each time in random ways inside the network. Low-latency anonymous networks have thus been shown to be vulnerable to passive and active attacks. Attacks of the former kind can be carried out by correlating the startpoint of the network and the target anonymous session. Traffic correlation could seem difficult to perform on compressed, splitted and padded traffic. However, correlation between bandwidth peaks and interarrival times between peaks would still be possible. For example an attacker could easily correlate timings and volumes of the traffic entering the anonymous network with those leaving it, whenever it can eavesdrop on both the ends of the communication [14]. On the other hand, active attacks work by simply disrupting packets and tracking which session gets delayed, or even by inserting specific patterns in an answer and trying to detect which anonymized session gets disrupted or altered, thus effectively backtracking the traffic to its source. Similarly, an adversary could inject timing patterns (or traffic with other discernible features) into the traffic entering the network and looks for corresponding patterns among exiting
4 traffic. This does not always require enormous power on the attacker side. For instance, on IIP (Invisibile IRC Protocol) an attacker can perform such an attack by simply using a client connected to the IRC network and communicating, with a fixed time/size pattern, with the anonymous user he wants to trace. While solutions to these problems have been under development for some time, we notice that a large part of the current systems address better the first class of problems rather than the second. The state of the art in low-latency network design is TOR [4]. While it solves a number of problems, it leaves four issues open: It lacks the added reliability of a peer-to-peer design, which protects against server instability It does not completely protect against end-to-end attacks based on traffic timing, size and pattern correlation It lacks protocol normalization, thus allowing an attacker to detect differences in protocol handling between various clients It lacks a steganographic approach, to hide any difference in the anonymous channel usage, wether or not an incoming or outgoing anonymous session is present 3 Sabbia: end goals and requirements analysis While designing Sabbia, we assumed an adversary who is able to read and to write arbitrary traffic on each point of the Internet, who can install modified Sabbia nodes and offer them as forwarding peers, and memorize unlimited traffic with access to huge computational power to analyze it. The main requirements we set for Sabbia are: Deployability: the Sabbia protocol does not require administrative access on the host in order to be deployed Stability of bandwidth requirement: Sabbia requires equires the user to set the maximum bidirectional bandwidth he desires to volunteer to the anonymous link (for connections both initiated or received by the user). Safeguards are built into the protocol to avoid that this amount of offered bandwidth is shaped or otherwise delayed. This limitation also avoids traffic peaks and bursts due to flood or abuse of bandwidth due to large downloads. Overall, a low-medium bandwidth offer (2kb/sec - 8kb/sec) is enough for low latency applications such as instant messaging, web browsing, sending, while it avoids typical abuses such as the download of vast amounts of copyright protected material Protocol normalization: HTTP, IRC, transfer and other application protocols contain information related with the client and its operating system, allowing fingerprinting. On specialized anonymous relays such as an anonymous r er, sensitive information relative to the original sender can be stripped because the protocol is known a priori; on this type of network, we need an application layer dissector, able to find sensitive communication fields, and to change them with the endpoint fields.
5 Simulated Steganography: steganography [15] usually is meant as concealing information into other information; in Sabbia, we use a concept we call simulated steganography, by which we mean we force the network to present always the same communication pattern, thus avoiding observers to detect the presence or absence of anonymous traffic Secure against end-to-end attack: Sabbia is designed to be resistant against correlation even if an attacker creates a number of malicious nodes inside the network, since its security is not based on a simple forwarding chain Secure against passive attacks: Sabbia is studied to be proof against a correlation attack brought by the all-powerful attacker we assumed, because all peers produce continuously the same traffic patterns, eluding most passive attacks Secure against active attacks: Sabbia is also studied to be secure under active attacks brought by the same attacker; an emulation engine at the application layer allows to automatically manage sessions in case the anonymous peer is delayed or otherwise disturbed by the attacker in order to cause an interruption which can be correlated Exit policy and traffic selection for endpoint user: the user can set an exit policy for traffic outgoing from its node, which is trasmitted along with the key and the network information to the other peers, in order to allow them to route fastly traffic to a peer which is near to the connection destination and which allows the required service in outgoing traffic Best of both worlds: Sabbia tries to achieve the best features of both chainbased networks and peer-to-peer networks; the former are strongly secure against infiltration of malicious peers, while the latter supports dynamic, short-lived peers in the network. The drawback is that in a peer-to-peer structure an adversary could be running a large part of the peers for analysis and tracking pourposes. On the other hand, a safe and long chain causes a great loss of performance. Sabbia mixes a trusted forwarder chain with random peers, in order to keep the chain short but still safe, and introducing a trusting mechanism between peers via public key signatures 4 Sabbia network structure 4.1 Trust mechanism Sabbia bases its network and its trust mechanisms on concepts drawn from the study of natural networks [5]. Figure 1 shows how a generic network of Sabbia nodes could be interconnected. Sabbia does not require a strong trust mechanism in order to work, but being able to reach a trusted entrypoint increses performance and security. The trust mechanism we chose is a simple mechanism based on key signing, in a very similar way to the PGP/GPG web-of-trust concept for certifying keys [16]. Sabbia uses the PGP keyservers to store the node keys, which enable clients to upload public keys, add signatures to keys and retrieve the signature list. The owner of the node can, if he wants to, sign with his own key the node public
6 Fig. 1. A Typical Sabbia Network key, thus linking the trust network of Sabbia with the personal trust network of PGP. All the keys share a common keyword, thus making search simple and enabling the client to download all of them in a bulk (hiding which is the key we are really looking for). They also present a unique ID not directly linked to the user who generated them. Once the keys have been obtained, it is straightforward to build a trust network, where the distance between nodes (the number of trusted introductions needed to recognize a key) is an inverse index of trustability (i.e. a node distant 2 is inherently less trustworthy than a node distant 1, which has been directly recognized by the user). The user himself can fixate how much he will trust other nodes, depending on this distance. This process can become totally automated and transparent, or the user can choose to decide case by case wether or not he trusts a particular key. 4.2 Small world effect The anonymous network created by Sabbia is not uniformly spread over the network. Local or national interest groups on privacy technology diffusion, close communities of friends interested in this technology, and collaborative peers in privacy-sensitive work environments cause anonymous network to show a small world effect, which makes a totally random choice of the chain of forwarders suboptimal for performance purposes. However, since none of these effects is linked to network access choices, it is likely that the distribution of such nodes between different autonomous systems and ISPs will be more or less random, which means that the larger an ISP is, the most likely it is to find a trusted node already operating inside its domain. Sabbia tries to leverage the small world effect, connecting nearby pears together through a central point called Central Peer (CP). Usually, this will be the peer with the best bandwidth offer and uptime, and can be auto-elected or chosen by others as a trusted peer. Endpoint peers (EP) therefore can connect
7 anonymous link Sabbia deamon Continuos payload Packet encryption Anomaly detector Key manager Queue manager Protocol dissector IPC Exit policy Dissimulation engine plain anonymous sessions IPC Socket wrapper Application wrapper Fig. 2. Design of Sabbia: Daemon Layers and Application Wrapper to the network using a stable, trusted peer which they also have a good connection to. Each CP stores and forwards to other CPs informations on the EPs connected to it (network information, public key and exit policy), hiding their IP addresses and assigning them an anonymous ID for reference. Each node can become a CP, and in fact a node could be contemporaneously in both roles for different neighborhoods. Except for network organization purposes, CP and EP nodes can perform the same operations. Routing operations are also mediated by CPs. In order to route efficiently, besides the information on trust transmitted through key exchange nodes must take into account throughput and latency values. It is plain that in a virtual network such as Sabbia a multiple-hop path could be much more convenient than a single-hop, high-latency one, providing a better latency-anonimity tradeoff. Thus, CPs must also store and forward transmission statistics (bandwidth, latency, packet loss) of nodes connected besides them. 5 Application Architecture Sabbia has a multilayer application architecture, as shown in Figure 5. Basically, the daemon is a software component which must always run while connected to the Sabbia network, and manages user anonymization and handles sessions from anonymous users received while working as a relay. The application wrapper component instead is activated whenever the user wants to anonymize a session. 5.1 The Application Wrapper The Sabbia Application Wrapper (SAW) wraps all the system calls related to network communications (which is easy to implement and port in most common operating systems, through the concept of shared libraries and redirection). In
8 this way, it makes transparent for the applications the use of the Sabbia anonymous network, while it forwards to the daemon any connection request and/or application data, and passes back to the application any answer. This also solves a simple but common problem, the fact that usually anonymous network do not conceal DNS requests. Wrapping the name resolution requests to the operating system makes SAW able to use the anonymous network for name resolution, hiding the anonymous session better. Wrapping sessions directly is important for the Sabbia protocol, which thus interacts poorly with other technologies that already incapsulate sessions (for instance, VPN tunnels) under both the performance and the security profile. Performance decreases because re-encapsulating an encapsulated TCP connection causes an higher packet loss and possibly fragmentation due to MSS restriction. Security is impacted because Sabbia cannot anonymize the upper layer protocols in the encrypted link. 5.2 The Sabbia Daemon The Sabbia deamon (SaD) is the core application which handles incoming and outgoing anonymous sessions. As shown in Figure 5 the daemon is structured in a multilayer fashion and sits between applications (requesting network communication through the wrapper), and the operating system, which will ultimately send data over the network. Let us consider the various components of SaD, beginning from the one closer to the network stack: the Continuous Payload Generator. As we said, we want that any peer always generates the same amount of traffic ( simulated steganography ). Once the bandwidth has been fixated by the user, it can be divided into equally sized, equally spaced packets; e.g if the bandwidth is 4 kb/sec, SaD can send three packets each second, each with 1365 bytes of data. This will constantly happen, bidirectionally, no matter what happens on the anonymous network. If the link is unused, packets contain just padding. If the link is used, part of the padding is substituted with encrypted data. There is no way, for an external observer, to infer the switch from one state to the other, no signalling happens between the peers. We use UDP for this fixed-size transmissions. Inside the payload, a Sabbia Header (SH) is present, containing the following transmission control fields: Random Value: a nonce used for freshness in encryption, due to the use of an ECB mode as opposed to classical CBC mode (see below) Checksum: an encrypted parity check, used to understand if the packet has been tampered with Incremental Counter: each packet is numbered to avoid replications and to detect packet loss Timestamp: timing the RTT between hops is needed both for routing purposes and for intrusion detection purposes Message length: used to discriminate between real data and padding. If 0, the packet is fake
9 Since timing is so crucial, the safe-side decision is that when a packet cannot be transmitted or encrypted safely at the precise time, SaD opts to send a meaningless padding packet instead; also, precise safeguards are adopted to avoid the packet sending to be delayed due to interactions with other software components on the system. Encryption is performed by the Packet Encryption Layer. Data compression is applied before encrypting, and the Sabbia Header is added. The random nonce and the timestamp add entropy to the plaintext, which makes it safe to use an ECB-mode algorithm. ECB is more resilient to packet loss, but requires freshness in order to avoid well-known attacks (since identical plaintexts encrypt to identical cyphertexts). We use the AES algorithm [17]. Obviously, the arbitrary division of the bandwidth in fixed payload sizes has to be adjusted in order to be divisible with the encryption block size of AES. A shared session key is exchanged between the peers using public key encryption, and is changed after a random number of packets, chosen by the peers. In order to explain how the key exchange system works, let us consider how an EP would encrypt a connection. Obviously, to enter the Sabbia network, it has connected with a CP and has established a bidirectional link with it, exchanging a shared encryption key using the CP public key. The protocol, however, behaves differently depending on the level of trust EP has in CP. If EP trusts CP, it can send packets encrypted with the shared key to CP, and CP will receive the packet, decrypt it and retrieve the real length of the message. If the lenght is 0, the packet contains only random data and can be discarded, else the packet contains some data and it is thus passed on for processing or forwarding. If EP does not trust CP, however, we must take additional steps to protect the communication. We need to find a trusted remote peer among the ones connected to CP, let us call this trusted peer EP2. Obviously, we do not directly know its address, but we know the ID which CP has assigned to it, and we have routing information to choose a path (in the case we are collected to multiple CPs announcing a route to that host). What we need to do, henceforth, is to exchange a shared key with EP2, on the anonymous link relayed by CP. We send the key exchange packet on the link, encrypting it with the key we share with CP. The CP decrypts the external layer, but it only learns who is the intended recipient and nothing more. It will then relay the key exchange session to the recipient. Once a shared key has been negotiated between EP and EP2, CP will act as a simple message passer, since it cannot decrypt packets anymore. This has the drawback that CP is also forced to forward random padding packets, which could saturate its links and activate the policy manager, making our session lose priority. The Intrusion Detection Layer makes use of the timestamps in order to verify routing problems, congestions and possible tampering on the network. This helps prevent active attacks where an adversary tries to slow down the link between two anonymous peer for correlating and backtracing the sessions being anonymized on that link. This is not just impossible to avoid, but also really difficult to detect. But Sabbia, thanks to this layer, can detect these malfunc-
10 tionings. It then tries to understand wether they are natural or induced by an attacker. If an attack is detected, the dissimulation engine is invoked and the user is notified that someone is tampering with his link. The Key Manager is a utility layer which supports key selection, parsing and signature checks in order to manage received public keys. It builds the trust network and manages key exchange, rotation and recomputation, handing out to the Packet Encryption Layer all the information they require in order to perform cryptography operations. The Queue Manager performs the strong traffic shaping required by Sabbia in order to preserve the exact timing of packet sending. It collects traffic incoming from the anonymous link which must be forwarded (either encrypted or in plain text, depending on wether the remote host trusted us or not), and outbound data coming from the local machine. The Queue Manager assign priorities to the traffic trying to optimize performance. A simple policy is to give top priority to highly interactive protocols like SSH or Telnet, and to penalize Web browsing and other bulk transfer protocols. On the top of this we can grant higher priority to sessions initiated by the user as opposed to forwarded sessions, and further penalize continuous encrypted sessions resulting from an EP not trusting the CP. The Protocol Dissector is an intermediate layer which receives the incoming sessions, and acts as an application layer proxy, i.e. it receives commands and transmits them, and then relays back the answers. This is useful because in this way the exit point can relay the commands to the final destination and then send back the answers without caring about the application protocol, atomicity is preserved and performance on the anonymous link is optimized. Also, by caching the transactions for a fixed amount of time the peers can retransmit data lost on the anonymous link without making a new request to the external server. In addition, Protocol Dissector strips fingerprinting information, e.g. Mail Tranport Agent headers, HTTP User Agent, and such, substituting them with anonymous alternatives. Since the Protocol Dissector must be easily extendible, it has been implemented as a series of external plug-in modules which can be loaded on request. The Exit Policy Checker verifies the constraints set by the user on the allowable outgoing protocols from its node. In this way a user can avoid to become the unwilling relay of attacks, or to allow unlawful or morally debatable content flowing through his system. The Dissimulation Engine is a defensive segment which can be evoked by the Intrusion Detection Layer. The engine tries to emulate the presence of a user behind an anonymous session which is being maliciously slowed down or blocked, in order to avoid active attacks which try to correlate the link disruption with an interruption in the anonymous session. In order to work, the Engine needs access to application layer data, thus it can work only over protocols that are supported by the Protocol Dissector. The actual evasive action depends heavily on the application: for instance, let us consider an IRC session. While it is perfectly normal for a user to be idle, it
11 is anomalous for him not to answer PING requests from the server. Thus, the Dissimulation Engine will in this case answer to PING on behalf of the client. An HTTP session could be emulated requesting some random link using the last URL as the HTTP Referral. These dissimulative actions could be refined further, but they are in fact enough to make an active attack not automatically executable. It would still be difficult to fool an human observer. 6 Sabbia against active and passive attacks In this section we recapitulate how Sabbia protects the user agains known attacks against low latency anonymous networks. The first layer of protection is provided by the joint use of the Application Wrapper and the Protocol Dissector: this allows to get rid of application-dependent fields which could allow an attacker to use passive identification. Since Sabbia avoids to use the OS TCP/IP stack during encapsulation, this side channel is also avoided. The Continuous Padding Generator, along with the Packet Encryption Layer, protects Sabbia against passive correlation attacks, making an attacker unable to distinguish between the real presence of traffic. In addition, only trusted hops (verified with sound public-key signatures) can see the real passage of traffic, the others will always see the same apparently random traffic. The presence of the nonce, sequence number and timestamp avoids active replay attacks from inside or outside the network. The encrypted checksum protects against active bit-flipping attacks. Freshness grants that traditional attacks against ECB mode cannot work. The Intrusion Detection Layer can detect active attacks such as the two outlined above, and also those based on traffic shaping and blocking, since the exact timing of packet transmission causes the detection of any network malfunctioning, whether incidental or hostile. The Dissimulation Engine can then take over and provide an emulation of user activity over a disrupted link. Obviously, we still cannot prevent an adversary running a Sabbia peer to maliciously disrupt communications inside the network, but we can avoid him to use this disruption to correlate anonymous sessions. 7 Conclusions This paper offers an overview of the design of Sabbia. Sabbia is intended as a proof-of-concept implementation of a set of guidelines and improvements over state-of-the-art protocol, rather then a full fledge production protocol. We believe that these guidelines define a winning approach to the problem of low-latency anonymous networks. The Sabbia network aims to develop trust-based relationships and optimized paths. The security of the Sabbia protocol against passive and active attacks has been discussed. So far, Sabbia turned out to resist to all of the attacks we outlined in this paper. Future extensions of this work will analyze the prototype in order to optimize the performance of networks based on continuous padding and to study how
12 to optimally determine size, frequency and randomic variation of their padding packets. Further optimizations to the bandwith usage could be achieved by diminishing the usage of random traffic, transmitting useful data along, or using a randomly variable bandwidth instead of a fixed bandwidth. A possible future extension could allow for an Intrusion Detection System to be plugged into the Exit Policy Checker, in order to allow the user more granularity in defining unacceptable requests and attacks to be dropped. References 1. George Danezis, Roger Dingledine, and Nick Mathewson. Mixminion: Design of a type III anonymous r er protocol. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, May Ulf Möller, Lance Cottrell, Peter Palfrader, and Len Sassaman. Mixmaster Protocol Version 2. Draft, July Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: a distributed anonymous information storage and retrieval system. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 46 66, July Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The secondgeneration onion router. In Proceedings of the 13th USENIX Security Symposium, August M. Buchanan. Small World: Uncovering Nature s hidden net- works. Weidenfeld & Micolson, London, David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February Adam Back, Ulf Möller, and Anton Stiglic. Traffic analysis attacks and tradeoffs in anonymity providing systems. In Ira S. Moskowitz, editor, Proceedings of Information Hiding Workshop (IH 2001), pages Springer-Verlag, LNCS 2137, April Wei Dai. Pipenet 1.1. Usenet post, August Michael J. Freedman and Robert Morris. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, November Marc Rennhard and Bernhard Plattner. Practical anonymity for the masses with morphmix. In Ari Juels, editor, Proceedings of Financial Cryptography (FC 04). Springer-Verlag, LNCS 3110, February Zach Brown. Cebolla: Pragmatic IP Anonymity. In Proceedings of the 2002 Ottawa Linux Symposium, June M. Rennhard, S. Rafaeli, L. Mathy, B. Plattner, and D. Hutchison. Analysis of an anonymity network for web browsing. In IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002), June Andrei Serjantov, Roger Dingledine, and Paul Syverson. From a trickle to a flood: Active attacks on several mix types. In Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578, October A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Computer Security - ESORICS 2003, LNCS Springer-Verlag, October 2003.
13 15. Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Information hiding A survey. Proceedings of the IEEE, 87(7): , S. Garfinkel. PGP: Pretty Good Privacy. O Reilly & Associates, Inc., William Stallings. The advanced encryption standard. Cryptologia, XXVI(3): , 2002.
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks Rungrat Wiangsripanawan, Willy Susilo and Rei Safavi-Naini Center for Information Security School of Information
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish
Tor Anonymity Network & Traffic Analysis Presented by Peter Likarish This is NOT the presenter s original work. This talk reviews: Tor: The Second Generation Onion Router Dingledine, Mathewson, Syverson
Locating Hidden Servers
Locating Hidden Servers Lasse Øverlier Norwegian Defence Research Establishment and Gjøvik University College lasse.overlier@{ffi,hig}.no Paul Syverson Naval Research Laboratory [email protected]
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
TOR (The Onion Router)
TOR (The Onion Router) TOR (The Onion Router) is a free software implementation of second generation onion routing a system enabling its users to communicate anonymously on the Internet. Originally sponsored
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Examining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Peer-to-Peer Networks Anonymity 9th Week
Peer-to-Peer Networks Anonymity 9th Week Department of Computer Science 1 Motivation Society Free speech is only possible if the speaker does not suffer negative consequences Thus, only an anonymous speaker
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Detecting Denial of Service Attacks in Tor
Detecting Denial of Service Attacks in Tor Norman Danner, Danny Krizanc, and Marc Liberatore Department of Mathematics and Computer Science Wesleyan University Middletown, CT 06459 USA Abstract. Tor is
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Playing Server Hide and Seek. [email protected] http://www.syverson.org
Playing Server Hide and Seek Lasse Øverlier Norwegian Defence Research Establishment Paul Syverson Naval Research Laboratory [email protected] http://www.syverson.org Location Hidden Servers Alice
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
The Disadvantages of Free MIX Routes and How to Overcome Them
The Disadvantages of Free MIX Routes and How to Overcome Them Oliver Berthold 1, Andreas Pfitzmann 1, and Ronny Standtke 2 1 Dresden University of Technology, Germany {ob2,pfitza}@inf.tu-dresden.de 2 Secunet,
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Privacy Vulnerabilities in Encrypted HTTP Streams
University of Massachusetts - Amherst ScholarWorks@UMass Amherst Computer Science Department Faculty Publication Series Computer Science 2005 Privacy Vulnerabilities in Encrypted HTTP Streams George Dean
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Using Dust Clouds to Enhance Anonymous Communication
Using Dust Clouds to Enhance Anonymous Communication Richard Mortier 1, Anil Madhavapeddy 2, Theodore Hong 2, Derek Murray 2, and Malte Schwarzkopf 2 1 Horizon Digital Economy Research Sir Colin Campbell
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Advanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security Securing communications (SSL/TLS and IPSec) Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network communication Who are you
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks
Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks *Abhishek Vora B. Lakshmi C.V. Srinivas National Remote Sensing Center (NRSC), Indian Space Research Organization (ISRO),
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes [email protected] University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
