Practical Traffic Analysis Attacks on Secure Messaging Applications
Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley
Electrical and Computer Engineering Department
Practical Traffic Analysis Attacks on Secure Messaging Applications - - PowerPoint PPT Presentation
Electrical and Computer Engineering Department Practical Traffic Analysis Attacks on Secure Messaging Applications Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley University of Massachusetts Amherst Instant
Electrical and Computer Engineering Department
2
3
IM Server
4
IM Server
Admins Members
5
6
7
IM Server Client Client
Admin Member1 Member 2 Member 3
8
9
Timing Size
10
11
IM Server
Adversary observes target user traffic A d v e r s a r y
s e r v e s t a r g e t c
m u n i c a t i
t r a f f i c a s g r
n d t r u t h
Target User
Target channel: “Let’s protest”
12
IM Server
Adversary observes target user traffic A d v e r s a r y
s e r v e s t a r g e t c
m u n i c a t i
t r a f f i c a s g r
n d t r u t h
Target User
Target channel: “Let’s protest”
13
IM Server
Adversary observes target user traffic A d v e r s a r y
s e r v e s t a r g e t c
m u n i c a t i
t r a f f i c a s g r
n d t r u t h
Target User
Target channel: “Let’s protest”
14
15
16
17
Inter-Message Delays (IMD) Message Sizes Communication Latency Message Types
18
19
Target User
20
1- Event Extraction 2- Correlation Function 3- Comparing to a Threshold Event MATCH! If two events are close enough:
21
Target User
22
1- Event Extraction 2- Traffic Normalization 3- Correlation Function Event 4- Comparing to a Threshold
Cosine Similarity Traffic Bars
23
24
25
Event-based algorithm Shape-based algorithm
26
27
Event-based detector
28
29
30
IM Server sender (admin) receiver (member) Adversary Watching Adversary Watching Local proxy Padding packets Local proxy Not observable by adversary Removing padded packets Remote proxy Remote proxy Padding packets Adding delay Removing padded packets
❖ Latency: A Laplacian distribution with parameter ❖ Adding dummy packets based on a Uniform Distribution
31
❖ SOCKS5 proxy ❖ Event-based attack With 10% bandwidth
have 30% decrease in confidence
32
Thanks to
33
SIM Server Local proxy Remove Padded packets Local proxy Padding packets Remote proxy Remove Padded packets Remote proxy Padding packets and adding delays
S u r v e i l l a n c e A r e a
34
IMProxy: A proxy-based obfuscation system
Obfuscate timings by adding delays Obfuscate sizes by adding dummy traffic
How it works?
35
❖ Evaluating against IMProxy aware adversary ❖ Adversary trains a classifier on traffic flows
36
Target User
Cosine Similarity
37
Oblivious adversary IMProxy-aware adversary
38
Viber Signal WhatsApp Telegram
39
40
Iran Russia