One Bad Apple Spoils the Bunch Stevens Le Blond Pere Manils - - PowerPoint PPT Presentation

one bad apple spoils the bunch
SMART_READER_LITE
LIVE PREVIEW

One Bad Apple Spoils the Bunch Stevens Le Blond Pere Manils - - PowerPoint PPT Presentation

One Bad Apple Spoils the Bunch Stevens Le Blond Pere Manils Abdelberi Chaabane Dali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous 1 2 3 4 IP address? 5 6 I am not going to be around this year... sorry for missing out on the


slide-1
SLIDE 1

1

One Bad Apple Spoils the Bunch

Pere Manils Abdelberi Chaabane Dali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous

Stevens Le Blond

slide-2
SLIDE 2

2

slide-3
SLIDE 3

3

slide-4
SLIDE 4

4

slide-5
SLIDE 5

5

IP address?

slide-6
SLIDE 6

6

slide-7
SLIDE 7

7

“I am not going to be around this year... sorry for missing out on the beer...”

slide-8
SLIDE 8

8

slide-9
SLIDE 9

9

Background

Source Destination 1 2 3

slide-10
SLIDE 10

10

Roadmap

1) 2 attacks against Tor 2) BitTorrent usage on Tor

slide-11
SLIDE 11

BitTorrent on Tor

11 Peer

  • n Tor

Peer

a) Get lists of peers

Tracker

(Tracker, DHT) b) Content distribution

slide-12
SLIDE 12

12 myPeer, …

1) Hijacking Tracker Responses

targetPeer Tracker Gimme peers Peer1, … myPeer, … myPeer myPeer, …

Traced 10,000 IPs

slide-13
SLIDE 13

13 Traced user Secret

2) The Bad Apple Attack

Whistleblower

For each BitTorrent stream, traced 2 additional streams (9% of all streams)

slide-14
SLIDE 14

14

Roadmap

1) 2 attacks against Tor 2) BitTorrent usage on Tor

slide-15
SLIDE 15

15

Over-representation per Country

BitTorrent on Tor BitTorrent outside Tor 14% US peers 14% US peers  Over = 1 14% Japanese peers 2.5% Japanese peers  Over = 5

Why some countries are over-represented?

slide-16
SLIDE 16

BitTorrent Usage in the US

16

slide-17
SLIDE 17

BitTorrent Usage in Japan

17

slide-18
SLIDE 18

BitTorrent Usage in Germany

18

Over-representations likely due to sociological reasons

slide-19
SLIDE 19

19

Take Home Messages

1) P2P filesharing apps kill privacy on Tor 2) Bad Apple attack can be severe 3) Significant fraction of Tor traffic can be traced with app-level attacks

Stevens.Le_Blond@inria.fr