traffic analysis
play

Traffic Analysis The Most Powerful and Least Understood Attack - PowerPoint PPT Presentation

Traffic Analysis The Most Powerful and Least Understood Attack Methods Raven Alder, Riccardo Bettati, Jon Callas, Nick Matthewson 1 What is Traffic Analysis? Signals intelligence that ignores content Information for analysis is the


  1. Traffic Analysis The Most Powerful and Least Understood Attack Methods Raven Alder, Riccardo Bettati, Jon Callas, Nick Matthewson 1

  2. What is Traffic Analysis? • Signals intelligence that ignores content • Information for analysis is the metadata • “Traffic analysis, not cryptanalysis, is the backbone of communications intelligence.” Susan Landau and Whitfield Diffie. 2

  3. Interesting Metadata • Endpoint addresses • Timing – Duration – Sequencing • Location? • etc. 3

  4. Why is it important? • The title of the panel says it all – We are going to startle you • Everyone needs to think differently – Often we’re protecting the wrong thing – TA shows the limits of possible defense • Potential for new research and creativity 4

  5. Historic Uses • Finding size, scope, intentions of military • Marketing research • Reconfigure networks 5

  6. Why do this? • Crypto • Too much data, already • It’s easier than analyzing everything • It’s hard to defend against 6

  7. Defenses • Include – Don’t communicate – Don’t be seen communicating • Spread Spectrum, etc. – Insert false communications • Naïve defenses often worse than nothing – Everything you know about this is wrong 7

  8. What can we do? • Determine alert status of military – Notorius “Domino’s Metric” • Identify authors of text – “Primary Colors” break against Joe Klein • Crack SSH passwords – Timing Analysis of Keystrokes and Timing Attacks on SSH [Usenix 2001] 8

  9. What more can we do? • Identify OS of remote hosts • Identify host as it moves around the net • Correlate virtual-to-physical hosts • Unravel mix nextworks 9

  10. What else can we do? • Remove text redacting – http://cryptome.org/cia-decrypt.htm • Identify movies being played – http://www.cs.washington.edu/research/security/ usenix07devices.pdf • Identify music being downloaded / played – CDDB finds albums with TA-like methods 10

  11. And even more • De-multiplex IPsec tunnels • Spatially locate hosts • Voice analysis of some speech patterns • Analysis of social networks • Google PageRank • nmap, p0f • Credit card fraud detection 11

  12. Open Questions? • How do we guard against TA? • How do we use TA? – Can it be used against spam, botnets? – Are there offensive and defensive uses? 12

  13. Additional Reading • “Introducing Traffic Analysis” by George Danezis – http://homes.esat.kuleuven.be/~gdanezis/TAIntro- book.pdf – http://homes.esat.kuleuven.be/~gdanezis/talks/TAIntro- prez.pdf – http://one.revver.com/watch/147903 13

  14. 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend