Packet-Level Signatures for Smart Home Devices Rahmadi Trimananda, - - PowerPoint PPT Presentation

packet level signatures for
SMART_READER_LITE
LIVE PREVIEW

Packet-Level Signatures for Smart Home Devices Rahmadi Trimananda, - - PowerPoint PPT Presentation

Packet-Level Signatures for Smart Home Devices Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, and Brian Demsky Smart Home 2 Smart Home Smart Plugs 2 Smart Home Smart Plugs Light Bulbs 2 Smart Home Smart Plugs Light Bulbs


slide-1
SLIDE 1

Packet-Level Signatures for Smart Home Devices

Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, and Brian Demsky

slide-2
SLIDE 2

Smart Home

2

slide-3
SLIDE 3

Smart Plugs

2

Smart Home

slide-4
SLIDE 4

Smart Plugs Light Bulbs

Smart Home

2

slide-5
SLIDE 5

Smart Plugs Light Bulbs Thermostats

Smart Home

2

slide-6
SLIDE 6

Smart Plugs Light Bulbs Thermostats Cameras

Smart Home

2

slide-7
SLIDE 7

Smart Plugs Light Bulbs Thermostats Cameras Doorbells

Smart Home

2

slide-8
SLIDE 8

3

LAN Traffic

Smart Home

slide-9
SLIDE 9

3

WAN Traffic

Smart Home

slide-10
SLIDE 10

3

Phone-Cloud

WAN Traffic

Smart Home

slide-11
SLIDE 11

3

Smart Home

Phone-Cloud

slide-12
SLIDE 12

3

Phone-Cloud

Smart Home

Not Not-so

  • privat

ate

slide-13
SLIDE 13

4

WAN Sniffer

WAN Traffic WAN Traffic

slide-14
SLIDE 14

4

WAN Sniffer

WAN Traffic WAN Traffic

slide-15
SLIDE 15

4

WAN Sniffer

Phone-Cloud

slide-16
SLIDE 16

4

WAN Sniffer

Phone-Cloud

1) Can look into TCP/IP packet 2) Can see IP address 3) Cannot see MAC address

slide-17
SLIDE 17

5

Wi-Fi Sniffer

WAN Traffic LAN Traffic WAN Traffic

slide-18
SLIDE 18

5

Wi-Fi Sniffer

WAN Traffic LAN Traffic WAN Traffic

slide-19
SLIDE 19

5

Wi-Fi Sniffer

Phone-Cloud

slide-20
SLIDE 20

5

Wi-Fi Sniffer

Phone-Cloud

1) Cannot look into TCP/IP packet 2) Cannot see IP address 3) Can see MAC address

slide-21
SLIDE 21

State-of-the-Art

  • Specific protocols (ZigBee/Z-Wave)Homonit [CCS’18]
  • Volume-basedApthorpe et al. [PETS’19]
  • ML-based approachesHomeSnitch [WiSec’19]
  • IoT datasetsRen et al. [IMC’19], Alrawi et al. [S&P’19]

6

slide-22
SLIDE 22

State-of-the-Art

  • Specific protocols (ZigBee/Z-Wave)Homonit [CCS’18]
  • Volume-basedApthorpe et al. [PETS’19]
  • ML-based approachesHomeSnitch [WiSec’19]
  • IoT datasetsRen et al. [IMC’19], Alrawi et al. [S&P’19]

6

slide-23
SLIDE 23

State-of-the-Art

  • Specific protocols (ZigBee/Z-Wave)Homonit [CCS’18]
  • Volume-basedApthorpe et al. [PETS’19]
  • ML-based approachesHomeSnitch [WiSec’19]
  • IoT datasetsRen et al. [IMC’19], Alrawi et al. [S&P’19]

6

slide-24
SLIDE 24

State-of-the-Art

  • Specific protocols (ZigBee/Z-Wave)Homonit [CCS’18]
  • Volume-basedApthorpe et al. [PETS’19]
  • ML-based approachesHomeSnitch [WiSec’19]
  • IoT datasetsRen et al. [IMC’19], Alrawi et al. [S&P’19]

6

Volume spike is event

slide-25
SLIDE 25

State-of-the-Art

  • Specific protocols (ZigBee/Z-Wave)Homonit [CCS’18]
  • Volume-basedApthorpe et al. [PETS’19]
  • ML-based approachesHomeSnitch [WiSec’19]
  • IoT datasetsRen et al. [IMC’19], Alrawi et al. [S&P’19]

6

slide-26
SLIDE 26

State-of-the-Art

  • Specific protocols (ZigBee/Z-Wave)Homonit [CCS’18]
  • Volume-basedApthorpe et al. [PETS’19]
  • ML-based approachesHomeSnitch [WiSec’19]
  • IoT datasetsRen et al. [IMC’19], Alrawi et al. [S&P’19]

6

slide-27
SLIDE 27

State-of-the-Art

  • Specific protocols (ZigBee/Z-Wave)Homonit [CCS’18]
  • Volume-basedApthorpe et al. [PETS’19]
  • ML-based approachesHomeSnitch [WiSec’19]
  • IoT datasetsRen et al. [IMC’19], Alrawi et al. [S&P’19]

6

Network statistics as features

slide-28
SLIDE 28

State-of-the-Art

  • Specific protocols (ZigBee/Z-Wave)Homonit [CCS’18]
  • Volume-basedApthorpe et al. [PETS’19]
  • ML-based approachesHomeSnitch [WiSec’19]
  • IoT datasetsRen et al. [IMC’19], Alrawi et al. [S&P’19]

6

slide-29
SLIDE 29

State-of-the-Art

  • Specific protocols (ZigBee/Z-Wave)Homonit [CCS’18]
  • Volume-basedApthorpe et al. [PETS’19]
  • ML-based approachesHomeSnitch [WiSec’19]
  • IoT datasetsRen et al. [IMC’19], Alrawi et al. [S&P’19]

6

  • Device study

○ Network traffic characteristics

  • Public datasets

○ Mon(IoT)r

https://moniotrlab.ccis.neu.edu/imc19/

○ YourThings

https://yourthings.info/

slide-30
SLIDE 30

Outline

  • I. Background and Problem Statement
  • II. Key Observation: Packet-Level Signatures

III.The PingPong System IV.Conclusion

7

slide-31
SLIDE 31

Outline

  • I. Background and Problem Statement
  • II. Key Observation: Packet-Level Signatures

III.The PingPong System IV.Conclusion

7

slide-32
SLIDE 32

8

Smart Home

Phone-Cloud

slide-33
SLIDE 33

8

LAN Traffic

Local Phone

Toggle ON Plug

slide-34
SLIDE 34

8

Request

Key Observation: Ping-Pong

PING!

Toggle ON Plug

slide-35
SLIDE 35

8

Reply PONG!

Key Observation: Ping-Pong

Toggle ON Plug

slide-36
SLIDE 36

8

WAN Traffic

Key Observation

Toggle ON Plug

slide-37
SLIDE 37

8

Request

Key Observation

Reply

Toggle ON Plug

slide-38
SLIDE 38

8

Phone-Cloud

WAN Traffic

Remote Phone

Toggle ON Plug

slide-39
SLIDE 39

8

WAN Traffic

Phone-Cloud

Remote Phone

Remote Phone

Toggle ON Plug

slide-40
SLIDE 40

8

Request

Remote Phone

Reply

Toggle ON Plug

slide-41
SLIDE 41

8

Request

Remote Phone

Reply

Toggle ON Plug

slide-42
SLIDE 42

Home Automation

8

Home Automation

Toggle ON Plug

slide-43
SLIDE 43

8

Request

Home Automation

Toggle ON Plug

slide-44
SLIDE 44

8

Request

Home Automation

Reply

Toggle ON Plug

slide-45
SLIDE 45

ON OFF

9

Ping-Pong in TP-Link Plug

slide-46
SLIDE 46

ON OFF

9

Ping-Pong in TP-Link Plug

slide-47
SLIDE 47

<C-556, S-1293> Device-Cloud

ON OFF

9

Ping-Pong in TP-Link Plug

slide-48
SLIDE 48

<C-556, S-1293> Device-Cloud Device-Cloud

ON OFF

9

Ping-Pong in TP-Link Plug

<C-557, S-1294>

slide-49
SLIDE 49

Phone-Cloud Phone-Cloud

ON OFF

10

<C-1117, S-613> <C-1118, S-613>

Ping-Pong in D-Link Plug

slide-50
SLIDE 50

11

Ping-Pong in SmartThings Plug

ON OFF

slide-51
SLIDE 51

<C-699, S-511> Phone-Cloud Phone-Cloud

ON OFF

11

Ping-Pong in SmartThings Plug

<S-612, C-136> <S-777, C-136> <C-700, S-511> <S-616, C-136> <S-780, C-136>

slide-52
SLIDE 52

<C-699, S-511> Phone-Cloud Phone-Cloud

ON OFF

11

Ping-Pong in SmartThings Plug

<S-612, C-136> <S-777, C-136> <C-700, S-511> <S-616, C-136> <S-780, C-136>

Packet-Level Signature of an Event Sequences of request-reply packet pairs with unique and deterministic packet lengths and directions

slide-53
SLIDE 53

Research Questions

  • How to automatically extract packet-level

signatures?

  • How universal are packet-level signatures?
  • How unique are packet-level signatures?

12

slide-54
SLIDE 54

Research Questions

  • How to automatically extract packet-level

signatures?

  • How universal are packet-level signatures?
  • How unique are packet-level signatures?

12

slide-55
SLIDE 55

Outline

  • I. Background and Problem Statement
  • II. Key Observation: Packet-Level Signatures

III.The PingPong System IV.Conclusion

13

slide-56
SLIDE 56

Automated Extraction

  • Extract these pairs
  • Form longest possible sequences
  • Use them as a signature

14

slide-57
SLIDE 57

PingPong Training

15

Input

Event Triggers Device

The PingPong System

slide-58
SLIDE 58

PingPong Training

15

Training

Data Collection Network Trace

Input

Event Triggers Device

The PingPong System

slide-59
SLIDE 59

PingPong Training

15

Training

Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System

slide-60
SLIDE 60

PingPong Training

15

Training

Pair Clustering Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System

slide-61
SLIDE 61

PingPong Training

15

Training

Pair Clustering Signature Creation Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System

slide-62
SLIDE 62

PingPong Training

15

Training

Pair Clustering Signature Creation Data Collection Trace Filtering Network Trace

Input

Event Triggers Device Signature Validation

The PingPong System

slide-63
SLIDE 63

PingPong Training

15

Training

Pair Clustering Signature Creation Data Collection Trace Filtering

Signature

Network Trace

Input

Event Triggers Device Signature Validation

The PingPong System

slide-64
SLIDE 64

PingPong Training

15

Training

Pair Clustering Signature Creation Data Collection Trace Filtering

Signature

Network Trace

Input

Event Triggers Device Signature Validation

The PingPong System

C-556 S-1293

slide-65
SLIDE 65

PingPong Training

15

Training

Pair Clustering Signature Creation Data Collection Trace Filtering

Signature

Network Trace

Input

Event Triggers Device Signature Validation

The PingPong System

C-556 S-1293 C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

slide-66
SLIDE 66

PingPong Training

15

Training

Pair Clustering Signature Creation Data Collection Trace Filtering

Signature

Network Trace

Input

Event Triggers Device Signature Validation

The PingPong System

C-556 S-1293 C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

slide-67
SLIDE 67

Research Questions

  • How to automatically extract packet-level

signatures?

  • How universal are packet-level signatures?
  • How unique are packet-level signatures?

16

slide-68
SLIDE 68

Research Questions

  • How to automatically extract packet-level

signatures?

  • How universal are packet-level signatures?
  • How unique are packet-level signatures?

16

slide-69
SLIDE 69

Universal Signatures

  • Three communications

17

slide-70
SLIDE 70

Universal Signatures

  • Three communications

17

Phone-Cloud

slide-71
SLIDE 71

Universal Signatures

  • Three communications
  • Two adversaries

○ WAN and Wi-Fi sniffers

17

slide-72
SLIDE 72

Universal Signatures

  • Three communications
  • Two adversaries

○ WAN and Wi-Fi sniffers

  • Different triggers

○ Local-Phone

17

slide-73
SLIDE 73

Universal Signatures

  • Applies to many devices

○ Our corpus: 18 devices

18

slide-74
SLIDE 74

Universal Signatures

  • Applies to many devices

○ Our corpus: 18 devices

18

slide-75
SLIDE 75

Universal Signatures

  • Applies to many devices

○ Our corpus: 18 devices

18

slide-76
SLIDE 76

Universal Signatures

18

  • Applies to many devices

○ Our corpus: 18 devices

slide-77
SLIDE 77

Universal Signatures

  • Applies to many devices

○ Our corpus: 18 devices

18

slide-78
SLIDE 78

Universal Signatures

  • Applies to many devices

○ Our corpus: 18 devices

19

slide-79
SLIDE 79

Universal Signatures

  • Applies to many devices

○ Our corpus: 18 devices ○ Public dataset Mon(IoT)r

■ Extraction for 21 new devices

19

slide-80
SLIDE 80

Universal Signatures

  • Applies to many devices

○ Our corpus: 18 devices ○ Public dataset Mon(IoT)r

■ Extraction for 21 new devices

19

slide-81
SLIDE 81

Universal Signatures

  • Applies to many devices

○ Our corpus: 18 devices ○ Public dataset Mon(IoT)r

■ Extraction for 21 new devices ■ Comparison for 5 common devices

19

slide-82
SLIDE 82

Universal Signatures

  • Three communications
  • Two adversaries

○ WAN and Wi-Fi sniffers

  • Different triggers

○ Local-Phone

19

slide-83
SLIDE 83

Universal Signatures

  • Three communications
  • Two adversaries

○ WAN and Wi-Fi sniffers

  • Different triggers

○ Local-Phone ○ Remote-Phone, and ○ Home Automation

19

slide-84
SLIDE 84

Universal Signatures

  • Three communications
  • Two adversaries

○ WAN and Wi-Fi sniffers

  • Different triggers

○ Local-Phone ○ Remote-Phone, and ○ Home Automation

19

Universal Signatures

slide-85
SLIDE 85

Universal Signatures

  • Three communications
  • Two adversaries

○ WAN and Wi-Fi sniffers

  • Different triggers

○ Local-Phone ○ Remote-Phone, and ○ Home Automation

  • Matching with recall > 97%

19

slide-86
SLIDE 86

Unique Signatures

  • Distinguish

○ Device type ○ Event type: binary and non-binary

○ Same-vendor devices

20

slide-87
SLIDE 87

Unique Signatures

  • Distinguish

○ Device type ○ Event type: binary and non-binary

○ Same-vendor devices

20

slide-88
SLIDE 88

Unique Signatures

  • Distinguish

○ Device type ○ Event type: binary and non-binary

○ Same-vendor devices

  • Negative control experiment

○ Three public datasets: >440 million packets

■ YourThings, UNSW, UNB

○ FPR: one FP per 40 million packets

20

slide-89
SLIDE 89

Packet-Level Signatures

  • Can distinguish event types

21

slide-90
SLIDE 90

Packet-Level Signatures

  • Can distinguish event types
  • Minimal set of traffic features

21

slide-91
SLIDE 91

Packet-Level Signatures

  • Can distinguish event types
  • Minimal set of traffic features
  • Two adversaries

21

slide-92
SLIDE 92

Packet-Level Signatures

  • Can distinguish event types
  • Minimal set of traffic features
  • Two adversaries
  • Applicable to many devices

21

slide-93
SLIDE 93

Packet-Level Signatures

  • Can distinguish event types
  • Minimal set of traffic features
  • Two adversaries
  • Applicable to many devices
  • Resilient to traffic shaping & VPN encryption
  • Defended against by packet padding

21

slide-94
SLIDE 94

Packet-Level Signatures

  • Can distinguish event types
  • Minimal set of traffic features
  • Two adversaries
  • Applicable to many devices
  • Resilient to traffic shaping & VPN encryption
  • Defended against by packet padding
  • Profiling and network monitoring

21

slide-95
SLIDE 95

Limitations

  • Need device to train
  • Signatures may vary over time
  • Apply to 95% of devices

○ UDP-based ○ Repetitive pairs for an event

22

slide-96
SLIDE 96

Outline

  • I. Background and Problem Statement
  • II. Key Observation: Packet-Level Signatures

III.The PingPong System IV.Conclusion

23

slide-97
SLIDE 97

Conclusions

  • Packet-level signatures

○ Request-reply pattern ○ Packet lengths and directions

  • Automation: PingPong

○ Extraction and detection

  • Signatures are universal and unique

24

slide-98
SLIDE 98

Thank You!

  • Paper

https://www.ndss-symposium.org/ndss- paper/packet-level-signatures-for-smart-home- devices/

  • Software and datasets

http://plrg.ics.uci.edu/pingpong/

25

slide-99
SLIDE 99

Additional Slides

slide-100
SLIDE 100

Signature Variations

  • Signatures with no variation
  • Signatures with ranges
  • Signatures that vary

○ Signature evolution ○ Signatures that vary in certain packets

■ App’s username and password

C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505] C-556 S-1293 C-592 S-1234 S-100 C-605 S-1213 S-100 C-556 S-1293 2018 2019

slide-101
SLIDE 101

PingPong Training

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-102
SLIDE 102

PingPong Training

tcpdump

Training

Data Collection Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-103
SLIDE 103

PingPong Training

adb tcpdump

Training

Data Collection Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-104
SLIDE 104

tcpdump

PingPong Training

adb Toggle-ON 11/08/2018 01:28:23 PM

Training

Data Collection Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-105
SLIDE 105

PingPong Training

... … C-123 S-456 … C-234 S-567 … C-345 S-678 ... … C-556 S-1293 ... C-238 S-826 … C-129 S-123 ... … C-123 S-456 … C-234 S-567 … C-345 S-678 … ... t PCAP file

Training

Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-106
SLIDE 106

PingPong Training

... … C-123 S-456 … C-234 S-567 … C-345 S-678 ... … C-556 S-1293 ... C-238 S-826 … C-129 S-123 ... … C-123 S-456 … C-234 S-567 … C-345 S-678 … ... t PCAP file Toggle-ON 11/08/2018 01:28:23 PM

Training

Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-107
SLIDE 107

PingPong Training

... … C-123 S-456 … C-234 S-567 … C-345 S-678 ... … C-556 S-1293 ... C-238 S-826 … C-129 S-123 ... … C-123 S-456 … C-234 S-567 … C-345 S-678 … ... t PCAP file Toggle-ON 11/08/2018 01:28:23 PM

Training

Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-108
SLIDE 108

PingPong Training

… C-556 S-1293 ... C-238 S-826 … C-129 S-123 ...

Training

Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-109
SLIDE 109

PingPong Training

… C-556 S-1293 ... C-238 S-826 … C-129 S-123 ... TCP Conn.1 … C-556 S-1293 ...

Training

Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-110
SLIDE 110

PingPong Training

… C-556 S-1293 ... C-238 S-826 … C-129 S-123 ... TCP Conn.1 … C-556 S-1293 ... TCP Conn.2 … C-238 S-826 ...

Training

Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-111
SLIDE 111

PingPong Training

… C-556 S-1293 ... C-238 S-826 … C-129 S-123 ... TCP Conn.1 … C-556 S-1293 ... TCP Conn.2 … C-238 S-826 ... TCP Conn.3 … C-129 S-123 ...

Training

Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System Toggle ON for TP-Link Plug

slide-112
SLIDE 112

PingPong Training

… C-556 S-1293 ... C-238 S-826 … C-129 S-123 ... <...,...> <C-556, S-1293> <...,...> <...,...> <C-238, S-826> <...,...> <...,...> <C-129, S-123> <...,...>

Training

Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System

Packet Pairs

Toggle ON for TP-Link Plug

slide-113
SLIDE 113

PingPong Training

<...,...> <C-556, S-1293> <...,...> <...,...> <C-238, S-826> <...,...> <...,...> <C-129, S-123> <...,...>

Training

Pair Clustering Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System

Packet Pairs

Toggle ON for TP-Link Plug

Signature Creation

slide-114
SLIDE 114

ON

PingPong Training

<...,...> <C-556, S-1293> <...,...> <...,...> <C-238, S-826> <...,...> <...,...> <C-129, S-123> <...,...>

Training

Pair Clustering Data Collection Trace Filtering Network Trace

Input

Event Triggers Device

The PingPong System

Packet Pairs

Toggle ON for TP-Link Plug

Signature Creation

slide-115
SLIDE 115

PingPong Training

<...,...> <C-556, S-1293> <...,...> <...,...> <C-238, S-826> <...,...> <...,...> <C-129, S-123> <...,...>

slide-116
SLIDE 116

PingPong Training

slide-117
SLIDE 117

PingPong Training

slide-118
SLIDE 118

PingPong Training

slide-119
SLIDE 119

PingPong Training

slide-120
SLIDE 120

PingPong Training

C-556 S-1293

slide-121
SLIDE 121

PingPong Training

slide-122
SLIDE 122

PingPong Training

slide-123
SLIDE 123

PingPong Training

slide-124
SLIDE 124

PingPong Training

slide-125
SLIDE 125

PingPong Training

slide-126
SLIDE 126

PingPong Training

slide-127
SLIDE 127

PingPong Training

slide-128
SLIDE 128

PingPong Training

C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

slide-129
SLIDE 129

PingPong Training

C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

slide-130
SLIDE 130

PingPong Training

  • Run detection

○ Same PCAP file

  • Valid signature iff

○ n detected events ○ n triggered events ○ Matching timestamps

Training

Pair Clustering Signature Creation Data Collection Trace Filtering Network Trace

Input

Event Triggers Device Signature Validation

The PingPong System

slide-131
SLIDE 131

PingPong Detection

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505] Arlo Camera

slide-132
SLIDE 132

PingPong Detection

Network Trace

C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505] Signature ...

slide-133
SLIDE 133

PingPong Detection

The PingPong System

Detection

Match Packet Network Trace

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505] ... C-339

slide-134
SLIDE 134

PingPong Detection

The PingPong System

Detection

Network Trace

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505] ... C-339 S-329

Match Packet

slide-135
SLIDE 135

PingPong Detection

The PingPong System

Detection

Network Trace

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505] ... C-339 S-329 C-365

Range-based Matching

Match Packet

slide-136
SLIDE 136

PingPong Detection

The PingPong System

Detection

Network Trace

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505] ... C-339 S-329 C-365 S-1065

Range-based Matching

Match Packet

slide-137
SLIDE 137

PingPong Detection

The PingPong System

Detection

Match Packet Network Trace

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

Match Sequence

... C-339 S-329 C-365 S-1065

First Sequence Matched

slide-138
SLIDE 138

PingPong Detection

The PingPong System

Detection

Match Packet Network Trace

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

Match Sequence

... C-339 S-329 C-365 S-1065 ... C-272

Range-based Matching

slide-139
SLIDE 139

PingPong Detection

The PingPong System

Detection

Match Packet Network Trace

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505] ... C-339 S-329 C-365 S-1065 ... C-272 S-500

Range-based Matching

Match Sequence

slide-140
SLIDE 140

PingPong Detection

The PingPong System

Detection

Match Packet Network Trace

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

Match Sequence

... C-339 S-329 C-365 S-1065 ... C-272 S-500

Second Sequence Matched

slide-141
SLIDE 141

PingPong Detection

The PingPong System

Detection

Match Packet Network Trace

Signature C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

Match Sequence

... C-339 S-329 C-365 S-1065 ... C-272 S-500

Event Match

Matched Events Event 1

slide-142
SLIDE 142

PingPong Detection

The PingPong System

Detection

Match Packet Network Trace

Signature

Match Sequence

... C-339 S-329 C-365 S-1065 ... C-272 S-500

Event Match

Matched Events Event 1 Event n . . .

C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

slide-143
SLIDE 143

PingPong Detection

The PingPong System

Detection

Match Packet Network Trace

Signature

Match Sequence

... C-339 S-329 C-365 S-1065 ... C-272 S-500

Event Match

Matched Events Event 1 Event n . . .

See paper for more detail

C-339 S-329 C-[364-365] S-[1061-1070] C-[271-273] S-[499-505]

slide-144
SLIDE 144

Possible Defenses

  • Seemingly not effective defense

○ VPN ○ Traffic injection and shaping

slide-145
SLIDE 145

Possible Defenses

  • Seemingly not effective defense

○ VPN ○ Traffic injection and shaping

  • More effective defense

○ Packet padding

■ Obfuscate packet lengths

slide-146
SLIDE 146

Possible Defenses

  • Not too effective defense

○ VPN ○ Traffic injection and shaping

  • More effective defense

○ Packet padding

■ Obfuscate packet lengths

  • See paper for detail