measuring and mitigating as level adversaries
play

Measuring and Mitigating AS-level Adversaries Against Tor Oleksii - PowerPoint PPT Presentation

Measuring and Mitigating AS-level Adversaries Against Tor Oleksii Adva Phillipa Michael Starov Zair Gill Schapira Rishab Nithyanand Network-level Traffic Correlation Attacks Internet rou,ng is asymmetric. Source -> Entry != Entry


  1. Measuring and Mitigating AS-level Adversaries Against Tor Oleksii Adva Phillipa Michael Starov Zair Gill Schapira Rishab Nithyanand

  2. Network-level Traffic Correlation Attacks Internet rou,ng is asymmetric. Source -> Entry != Entry -> Source Source Des0na0on Entry Exit RAPTOR (USENIX Security 2015): Any AS on AS Router (Source à Entry OR Entry à Source) AND (Exit à Dest OR Dest à Exit) is in a posi,on to launch a traffic correla,on aMack

  3. Measuring Network-level Adversaries A C Exit Entry Source Des0na0on B D Goal: Quan,fy the threat from network-level adversaries Approach: Iden,fy ASes on A, B, C, and D • ADV = {(𝐵 ∪ 𝐶) ∩( 𝐷 ∪ 𝐸 ) } Challenge: Traceroutes only let us obtain A

  4. Measuring Network-level Adversaries Our Approach: Spherical cows! • Make assump,ons about Internet rou,ng. • Obtain approximate AS-level paths. Approxima0ng ASes on a path (offline): • AS Topology: 36K ASes + 126K rela,onships • Use inter-AS rela,onships (customer, peer, provider) to decide whether an AS will route via another • Rou,ng through customers > peers > providers, then prefer shortest paths • If there are mul,ple op,ons, we consider all of them • (see paper for valida,on)

  5. Measuring Network-level Adversaries 10 Countries: BR, CN, DE, ES, FR, GB, IR, IT, RU, US 200 websites/country: Local Alexa T-100 + 100 Ci,zen Lab sensi,ve pages Adversaries: Network-level, colluding network-level (see paper), and state-level

  6. Measuring Network-level Adversaries How vulnerable is vanilla Tor? Main Circuit: Circuit carrying first “GET” request is vulnerable Any Circuit: Circuit carrying any request is vulnerable Frac0on of websites with 100 vulnerable circuits Main circuit Any circuit 80 Network-level 60 Adversary 40 20 0 BR CN DE ES FR GB IR IT RU US All Frac0on of websites with 100 vulnerable circuits 80 State-level 60 40 Adversary 20 0 BR CN DE ES FR GB IR IT RU US All

  7. Measuring Network-level Adversaries Can AS-aware relay selec0on help? YES! • > 20000 (source, des,na,on) AS pairs in each country • Consider 1000 * 1000 available (entry, exit) pairs • What frac0on of the 20000 (source, des0na0on) pairs have at most x% of their 1 million (entry, exit) pairs safe from network- level threats? BAD GOOD

  8. Astoria : This AS -aware Tor client i s a lright Measurement Toolkit 2. Compute “safe-op,ons” from all |entry-guard| * |legal-exits| op,ons OFFLINE 1. Convert (source, des,na,on) IPs to ASNs 3. Select one of the “safe-op,ons” 4. Construct and use circuit IP-ASN Database What if there are no safe op0ons? Astoria uses an LP to minimize number of circuits that are vulnerable to any single adversary. (see paper)

  9. Astoria : Security Evaluation Network-level Adversary any: 53% -> 8% main: 37% -> 3% State-level Adversary any: 88% -> 34% main: 82% -> 27%

  10. Astoria : Performance Evaluation 1 Cumulative Probability 0.8 Page-load 0mes 0.6 Tor : 5.9 sec 0.4 Astoria Astoria : 8.3 sec Vanilla Tor 0.2 Uniform Tor Uniform : 15.6 sec 0 0 5 10 15 20 25 30 Page Load Time (sec) 1 Cumulative Probability 0.8 0.6 Available relays Load balancing Perfect load balancing client 0.4 Astoria Similar to Tor* Vanilla Tor 0.2 Uniform Tor 0 0 2 4 6 8 10 12 14 Relay Bandwidth (MB/s)

  11. Conclusions • Offline path-predic,on toolkit to measure Tor vulnerability • Significantly beMer security against network-level adversaries • Cuts number of vulnerable websites to less than 1/4 th • Effec,vely deals with worst-case situa,ons • Load balancing: Similar to Tor • Page-load ,mes: BeMer than uniform, worse than Tor • Main problem: Cannot pre-build circuits like Tor • Arguably weaker against relay-level adversaries (see paper)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend