traffic confirmation attacks despite noise Jamie Hayes University - - PowerPoint PPT Presentation

traffic confirmation attacks despite noise
SMART_READER_LITE
LIVE PREVIEW

traffic confirmation attacks despite noise Jamie Hayes University - - PowerPoint PPT Presentation

traffic confirmation attacks despite noise Jamie Hayes University College London j.hayes@cs.ucl.ac.uk anonymous communication We kill people based on the metadata. - Michael Hayden (Former NSA Director) - Sometimes encryption isnt


slide-1
SLIDE 1

traffic confirmation attacks despite noise

Jamie Hayes

University College London j.hayes@cs.ucl.ac.uk

slide-2
SLIDE 2

anonymous communication

∙ ”We kill people based on the metadata.” - Michael Hayden (Former NSA Director) - Sometimes encryption isn’t good enough. ∙ Onion Routing attempts to hide this metadata by obscuring communication patterns by sending traffic through relays. ∙ Low latency - trade off between usability and security.

Traffic confirmation attacks despite noise 1/19

slide-3
SLIDE 3

how does tor work?

Entry relay Middle relay Exit relay Alice Bob

Traffic confirmation attacks despite noise 2/19

slide-4
SLIDE 4

how does tor work?

Entry relay Middle relay Exit relay Alice Bob

Traffic confirmation attacks despite noise 2/19

slide-5
SLIDE 5

how does tor work?

Entry relay Middle relay Exit relay Alice Bob

Traffic confirmation attacks despite noise 2/19

slide-6
SLIDE 6

how does tor work?

Entry relay Middle relay Exit relay Alice Bob

Traffic confirmation attacks despite noise 2/19

slide-7
SLIDE 7

how does tor work?

Entry relay Middle relay Exit relay Alice Bob

Traffic confirmation attacks despite noise 2/19

slide-8
SLIDE 8

traffic confirmation attacks

∙ Active attacks purposefully inject watermarks in to traffic. The adversary modifies network traffic flows introducing patterns that be can observed at another location in the network, allowing the adversary to de-anonymize clients. ∙ Passive attack captures traffic and creates a fingerprinting without injecting or modifying. ∙ Fingerprints created by exploiting unique information from network traffic traces like unique packet lengths and burst patterns. ∙ Easier when packet lengths are available but Tor pads all cells to a fixed size of 512 bytes.

Traffic confirmation attacks despite noise 3/19

slide-9
SLIDE 9

passive traffic confirmation attack

Entry relay Middle relay Exit relay Local clients Clients

Traffic confirmation attacks despite noise 4/19

slide-10
SLIDE 10

passive traffic confirmation attack

Entry relay Middle relay Exit relay Local clients Clients

Traffic confirmation attacks despite noise 4/19

slide-11
SLIDE 11

passive traffic confirmation attack

Entry relay Middle relay Exit relay Local clients Clients

Traffic confirmation attacks despite noise 4/19

slide-12
SLIDE 12

passive traffic confirmation attack

Entry relay Middle relay Exit relay Local clients Clients

Traffic confirmation attacks despite noise 4/19

slide-13
SLIDE 13

passive traffic confirmation attack

Entry relay Middle relay Exit relay Local clients Clients

Traffic confirmation attacks despite noise 4/19

slide-14
SLIDE 14

passive traffic confirmation attack

Entry relay Middle relay Exit relay Local clients Clients

Traffic confirmation attacks despite noise 4/19

slide-15
SLIDE 15

the threat is real

∙ Long history of passive attacks on Tor. ∙ E.g. [Steven J. Murdoch et al. 2007] ”Sampled Traffic Analysis by Internet-Exchange-Level Adversaries”. ∙ Not in the Tor threat model.

Traffic confirmation attacks despite noise 5/19

slide-16
SLIDE 16

tor congestion

∙ Currently packets are sent through the Tor network using TCP which guarantees reliable transmission. ∙ TCP flow control has been identified as a major cause of latency in Tor. ∙ If the reduction of latency in Tor or the use of VoIP and similar protocols is desired, it may be prudent to allow UDP over Tor.

Traffic confirmation attacks despite noise 6/19

slide-17
SLIDE 17

data

∙ 9000 traces of different website loads for client side [Wang et al. 2014], injected IPDV for server side. ∙ IPDV distribution collected over Tor. ∙ We set up a simple webpage hosted in five different regions. For each we loaded the webpage 100 times through Tor and recorded the packet time arrivals at both client and sever, giving the inter-packet delay variation that an adversary can expect between client and server when collecting traces over Tor. ∙ No live implementation.

Traffic confirmation attacks despite noise 7/19

slide-18
SLIDE 18

how to convert a traffic trace to a fingerprint

  • 1. Split the traffic trace in to N windows of equal time. Initialize

fingerprint, H, of m integers all set at 0.

  • 2. For each time window T0, .., TN−1 extract the max time, ¯

Ti, and the number of packets, Bi.

  • 3. H is a function of ¯

Ti and Bi onto m pseudo-random bases Ra(). The pseudo-random bases were chosen so that packets with similar timings will be projected to values on the bases that are close to

  • ne another, resulting in similar hashes for similar network traffic

flows.

  • 4. H is updated at each time window. With the final fingerprint:

Ha = sign(Ha) = { 1 if Ha > 0 if Ha ≤ 0 for a ∈ {1, .., m}.

Traffic confirmation attacks despite noise 8/19

slide-19
SLIDE 19

results

0.00 0.05 0.10 0.15 0.20 False positive rate 0.0 0.2 0.4 0.6 0.8 1.0 True positive rate

1% packet drop 5% packet drop 10% packet drop 30% packet drop

At 10% drop, TPR=0.7 and FPR=0.005. With 9,000 background traces 45 will be incorrectly flagged as match. Is this amount tolerable?

Traffic confirmation attacks despite noise 9/19

slide-20
SLIDE 20

padding

∙ Currently Tor does not implement any padding. ∙ Constant padding could defeat this attack but is probably too expensive to implement. ∙ Probabilistic padding offers a softer alternative. ∙ Adaptive padding [Shmatikov et al. 2006] tries to unlink sender and receiver of a communication by injecting padding in to statistically unlikely gaps in network traffic. This limits the amount

  • f extra bandwidth required and does not incur any latency costs

as packets are forwarded as soon as they are received.

Traffic confirmation attacks despite noise 10/19

slide-21
SLIDE 21

adaptive padding

= real packet, = dummy packet

∙ Adaptive padding (AP) uses histograms of inter-arrival packet times to determine when a packet should be injected. ∙ AP notifices there is a natural delay –> enters gap mode –> increases the probability of injecting a dummy packet. ∙ AP notifices traffic is flowing at a high rate –> enters burst mode –> reduced the probability of injecting a dummy packet. ∙ AP destroys natural fingerprints created by the gaps in flows.

Traffic confirmation attacks despite noise 11/19

slide-22
SLIDE 22

traffic confirmation attacks on ap

∙ All flows that are seen before the entry relay are padded by AP with padding removed by some trusted relay in the network before arriving at the destination of the communication. ∙ In the opposite direction we assume AP is applied before an adversary captures traffic (either by directly applying AP at the web sever, or at a trusted bridge) and is removed before an adversary captures traffic at the end of the circuit.

Traffic confirmation attacks despite noise 12/19

slide-23
SLIDE 23

traffic confirmation attacks on ap

For both incoming and outgoing network flows, we created histograms of inter-arrival packet times by crawling the top 25K alexa

  • websites. We then applied AP to each of the 9000 traces in our data

set, to simulate the padded flows collected by the adversary at the start of communication. Note that the adversary is only concerned with classifying one unpadded network flow at any one time.

Traffic confirmation attacks despite noise 13/19

slide-24
SLIDE 24

the attack

Since AP inserts dummy packets to gaps in a flow, the padded flow is a superset of the original flow. Given one unpdadded flow and a bunch of candidate padded flows. To find a match: ∙ split a flow in to windows of time. ∙ Each padded flow is given a score that corresponds to the number

  • f windows which share an equal number of packets with the

unpadded flow. ∙ Take the score for both incoming and outgoing padded flows, if the highest score of the incoming and outgoing flow is the from the same network traffic flow we consider this padded flow as the match of the unpadded flow.

Traffic confirmation attacks despite noise 14/19

slide-25
SLIDE 25

the attack

Padded traces Original trace

= real packet, = dummy packet

Traffic confirmation attacks despite noise 15/19

slide-26
SLIDE 26

results

∙ At the experimentally observed IPDV of 21ms, our attack is able to match over 90% of flows correctly. ∙ We observed almost no false positives.

0.0 0.2 0.4 0.6 0.8 1.0 Packet delay (sec) 0.0 0.2 0.4 0.6 0.8 1.0 Match rate

window size = 5.0 window size = 1.0 window size = 0.5 window size = 0.2

Traffic confirmation attacks despite noise 16/19

slide-27
SLIDE 27

practical implementation

∙ AP can only be applied to Tor in its current form in the forward direction. ∙ Relays do not have the ability to generate multi-hop dummy cells, instead clients must provide the dummy cells. ∙ The ability for relays to generate dummy cells would also violate Tor’s integrity checks since the running digest must be synchronized between client and relays, but a client has no way to check if a relay has generated new dummy cells. ∙ Before AP can be applied in Tor either a protocol change (realistic) must be applied or web servers must be persuaded to generate dummy cells server side (unrealistic).

Traffic confirmation attacks despite noise 17/19

slide-28
SLIDE 28

summary

∙ AP is vulnerable to simple yet powerful timing attacks. ∙ Any padding scheme that doesn’t intentionally add some delay will be vulnerable. ∙ Our attack only works well for small amounts of jitter and becomes ineffective as the volatility of jitter increases. Adding small random packet delays could foil timing attacks without incurring a high latency overhead.

Traffic confirmation attacks despite noise 18/19

slide-29
SLIDE 29

thanks

Questions? j.hayes@cs.ucl.ac.uk or @_jamiedh

Traffic confirmation attacks despite noise 19/19