Understanding Network Interference in CS590B/690B Lecture

Slide Note
Embed
Share

Delve into the realm of network interference through the CS590B/690B lecture with Phillipa Gill at UMass Amherst. Explore topics such as Internet routing, timing attacks, BGP hijacks, Tor network functionality, relay selection, collusion scenarios, use of guards, web site fingerprinting attacks, traffic analysis attacks, and more. Gain insights on attack criteria, evaluation methods, and the threat landscape to the Tor network. Understand the challenges and strategies to mitigate AS-level attacks and ensure network security.


Uploaded on Oct 04, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. CS590B/690B DETECTING NETWORK INTERFERENCE (SPRING 2018) LECTURE 16 PHILLIPA GILL UMASS -- AMHERST.

  2. WHERE WE ARE Last time: Internet routing review + timing attacks BGP hijacks/path asymmetry

  3. TEST YOUR KNOWLEDGE 1. 2. 3. 4. What is the goal of Tor? How does Tor accomplish this? How does Tor pick relays? What happens if you compromise.. The entry relay? The middle relay? The exit relay? What happens if the entry and exit relay collude? Why 3 hops? Why not 1? Why not 2? How does Tor avoid colluding relays from being chosen? Why are guards used? How are guards chosen? 10. What meta data is used by Web site fingerprinting attacks? 11. What is the premise behind Web site fingerprinting attacks? 5. 6. 7. 8. 9.

  4. TODAY Continuing with traffic analysis attacks. Readings: 1. Users get routed 2. Holding all the ASes

  5. REVIEW OF ATTACK CRITERIA/ EVALUATION OF POTENTIAL IN PRACTICE

  6. Attack criteria Any AS that lies on the Forward OR Reverse path, between the Source and Entry AND Exit and Destination can execute the attack Middle relay Entry relay Exit relay Destination AS Source AS Challenge: How to measure and mitigate these attacks in practice? We can t actually measure reverse paths Also can t traceroute through Tor Our approach: Use simulations on empirical AS graphs Consider all paths compliant with a model of routing policies Gives an approximation on potential attacks Need to measure/infer network paths! 6

  7. Understanding the threat to Tor Method: Use VPN to connect to 200 sites (100 popular, 100 likely censored) through Tor VPN end points located in 10 countries Examine AS-paths between source and destination and chosen entry/exit relays. Vulnerable sites (%) 53% of sites have at least some content delivered over a vulnerable Tor circuit 7

  8. Astoria: Avoiding AS-level attackers Choose an entry/exit relay to avoid attackers Usually there is such an option Challenge: How to find the safe option? Path computations need to be done on the client Challenge: ASes may collude We resolve sibling ASes (e.g., 701, 702, 703 = Verizon) and evaluate country-level adversaries Challenge: Minimize performance impact Cannot pre-construct circuits as in vanilla Tor Byproduct of destination-based relay selection Challenge: Don t overload popular relays If there are multiple safe options load balance across them What are the paths? Which relay selection is safe? 8

  9. What if there is no safe option? What if all relay selections contain at least one AS that can perform the timing attack? Astoria minimizes the amount any given attacker can learn Linear program 1/3 Entry AS 1 ISP 1 can snoop with prob. 2/3 ISP 1 1/3 Source AS Entry AS 2 ISP 2 Entry AS 3 1/3 9

  10. What if there is no safe option? What if all relay selections contain at least one AS that can perform the timing attack? Astoria minimizes the amount any given attacker can learn Linear program ISP 1 can snoop with prob. 1/2 Entry AS 1 1/4 ISP 1 Source AS Entry AS 2 1/4 ISP 2 Entry AS 3 1/2 10

  11. Additional slides See this slide deck (Slides 21-26, for overview of Cipollino) https://www.dropbox.com/s/podehxeulk8xsbp/rishab-defense- 2016.ppsx?dl=0 See this slide deck for an overview of the Users Get Routed reading: https://www.dropbox.com/s/ei8wse2zou537oi/L16-tor-users- routed-slides.pdf?dl=0 11

Related


More Related Content