dartmouth internet security testbed dist building a
play

Dartmouth Internet Security Testbed (DIST): building a campus-wide - PowerPoint PPT Presentation

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Dartmouth Internet Security Testbed (DIST): building a campus-wide wireless testbed Sergey Bratus David Kotz Keren Tan William Taylor Bennet Vance 1 Anna


  1. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Dartmouth Internet Security Testbed (DIST): building a campus-wide wireless testbed Sergey Bratus David Kotz Keren Tan William Taylor Bennet Vance 1 Anna Shubina Michael E. Locasto 2 1 Dartmouth College, Hanover, New Hampshire 2 George Mason University, Fairfax, Virginia 2nd Workshop on Cyber Security Experimentation and Test, 2009 Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  2. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Outline DIST Architecture and Operation 1 Data Protection and Sanitization 2 3 Harsh Realities Convincing Organizations Convincing Humans Technical Issues Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  3. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Outline DIST Architecture and Operation 1 Data Protection and Sanitization 2 3 Harsh Realities Convincing Organizations Convincing Humans Technical Issues Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  4. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities DIST Architecture and Operation Covered in this talk: Dartmouth Internet Security Testbed (wireless) DIST wireless in short Over 200 wireless Air Monitors capturing 802.11 frames Aruba AP70 access points reflashed with OpenWRT firmware DIST servers processing the captured frames and storing sanitized data Launchpad, a DIST server that alone may launch experiments using the Air Monitors Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  5. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities DIST Architecture and Operation Covered in this talk: Dartmouth Internet Security Testbed (wireless) DIST wireless in short Over 200 wireless Air Monitors capturing 802.11 frames Aruba AP70 access points reflashed with OpenWRT firmware DIST servers processing the captured frames and storing sanitized data Launchpad, a DIST server that alone may launch experiments using the Air Monitors Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  6. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities DIST Architecture and Operation Covered in this talk: Dartmouth Internet Security Testbed (wireless) DIST wireless in short Over 200 wireless Air Monitors capturing 802.11 frames Aruba AP70 access points reflashed with OpenWRT firmware DIST servers processing the captured frames and storing sanitized data Launchpad, a DIST server that alone may launch experiments using the Air Monitors Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  7. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities DIST at a glance Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  8. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities DIST Architecture and Operation Red arrows show sensitive traffic. Green arrows show frames that are encrypted or sanitized. Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  9. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Outline DIST Architecture and Operation 1 Data Protection and Sanitization 2 3 Harsh Realities Convincing Organizations Convincing Humans Technical Issues Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  10. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Data Protection and Sanitization Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs? - Sanitization on AMs would be too CPU-intensive. - Sharing the sanitization key securely is hard. Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  11. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Data Protection and Sanitization Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs? - Sanitization on AMs would be too CPU-intensive. - Sharing the sanitization key securely is hard. Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  12. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Data Protection and Sanitization Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs? - Sanitization on AMs would be too CPU-intensive. - Sharing the sanitization key securely is hard. Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  13. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Data Protection and Sanitization Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs? - Sanitization on AMs would be too CPU-intensive. - Sharing the sanitization key securely is hard. Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  14. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Data Protection and Sanitization Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs? - Sanitization on AMs would be too CPU-intensive. - Sharing the sanitization key securely is hard. Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  15. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Encryption Task Encrypting a continuous stream of frames. Cipher Stream cipher Rabbit, optimized for the MIPS 4Kc processor. Stream ciphers vs block ciphers. A block cipher is easier to attack by enumerating inputs. (This could be fatal for DIST’s easily predictable data) A stream cipher might be faster. Rabbit won on AP70s over other eStream ciphers and SNOW2. (Perhaps due to optimized implementation.) Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  16. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Encryption Task Encrypting a continuous stream of frames. Cipher Stream cipher Rabbit, optimized for the MIPS 4Kc processor. Stream ciphers vs block ciphers. A block cipher is easier to attack by enumerating inputs. (This could be fatal for DIST’s easily predictable data) A stream cipher might be faster. Rabbit won on AP70s over other eStream ciphers and SNOW2. (Perhaps due to optimized implementation.) Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  17. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Encryption Task Encrypting a continuous stream of frames. Cipher Stream cipher Rabbit, optimized for the MIPS 4Kc processor. Stream ciphers vs block ciphers. A block cipher is easier to attack by enumerating inputs. (This could be fatal for DIST’s easily predictable data) A stream cipher might be faster. Rabbit won on AP70s over other eStream ciphers and SNOW2. (Perhaps due to optimized implementation.) Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

  18. DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Encryption Task Encrypting a continuous stream of frames. Cipher Stream cipher Rabbit, optimized for the MIPS 4Kc processor. Stream ciphers vs block ciphers. A block cipher is easier to attack by enumerating inputs. (This could be fatal for DIST’s easily predictable data) A stream cipher might be faster. Rabbit won on AP70s over other eStream ciphers and SNOW2. (Perhaps due to optimized implementation.) Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend