Mark - Computer Science and Engineering
Download
Report
Transcript Mark - Computer Science and Engineering
Invisible Traceback in
the Internet
Dong Xuan
Department of Computer Science and Engineering
The Ohio-State University
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
Traceback in the Real World
李世民
李立峰
李亚南
李勇
李强
Animal traceback
Wuhan Univ., 9/17/2008
Mail traceback
Dong Xuan/The Ohio-State Univ.
李文
李飞
Family traceback
2/32
Traceback in the Internet
Trace the origin of a packet (or a message)
Trace illegal file distributor and downloader
Trace two cyberspace criminals communicating
with each other
Investigator
Evil
Wuhan Univ., 9/17/2008
Evil
Dong Xuan/The Ohio-State Univ.
3/32
Invisible Traceback in the Internet
Investigator’s activity of traceback is
unaware to suspects (e.g. illegal file downloaders and cyberspace criminals.)
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
4/32
Significance of Invisible Traceback
The Internet has become a breeding ground for
a variety of crimes
Credit Card Fraud
Illegal Downloading
Cyber-Terrorism
Virus Distribution
Traceback makes the above crimes accountable
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
5/32
Significance of Invisible Traceback
(Cont’d)
Invisibility is critical, otherwise,
The criminals will simply stop communicating with
each other, thereby evading further detection.
They may even develop countermeasures to fool
or mislead investigators etc.
Invisible traceback is an important network
forensic technique for legal surveillance
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
6/32
Challenges in Invisible Traceback
The nature of the Internet
Large scale and loose control
Destination oriented routing and forwarding –
easily spoofing source IP address
No intimidate node traffic recording
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
7/32
Challenges in Invisible Traceback
The availability of anonymous systems
Receiver
Sender
B to R
B
S to A
A
Human Spy Network
Wuhan Univ., 9/17/2008
A to B
Anonymous Communication
Dong Xuan/The Ohio-State Univ.
8/32
Our Focus
Sender
Receiver
Anonymous
Channel
Suspect Sender is sending traffic through an
encrypted and anonymous channel, how can
Investigator trace and confirm who receiver is?
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan and Wei Zhao, DSSS-Based Flow
Marking Technique for Invisible Traceback, in Proc. of IEEE Symposium on Security
and Privacy (oakland), May 2007, pp. 18-32.
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
9/32
Outline
Flow marking-based traceback technique
Prototyping
Turning into a real-world tool
Related work
Final remarks
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
10/32
Intuitive Solution
Packet marking
Put some marks into packets,
Sender
Receiver
Anonymous
Network
However,
Packets are encrypted in anonymous systems,
careless mark will fail decryption
Visible to the attacker
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
11/32
Our Solution
Flow marking
Change traffic flow rates
Traffic rate changes represent a “mark”, i.e. a
special secret code
Sender
Anonymous
Network
Anonymous
Channel
Interferer
Investigator
Receiver
Sniffer
Investigator knows that Sender communicates with Receiver!
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
12/32
Key Differences between Packet
Marking and Flow Marking
Packet Marking
Mark is embedded in packets
Packet content is changed
It is very difficult, if impossible, to hide such
changes when packets are encrypted
Flow Marking
Mark is embedded in flow rate changes
No packet content is changed
It is feasible to hide flow rate changes in the
Internet, typically with dynamic traffic
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
13/32
Questions to Flow Marking
A “small” question
How is a mark embedded into flow rate changes?
Two “big” questions
How to make the traffic rate changes “invisible”?
How to make the traffic changes “robust” to burst
traffic interference in the Internet?
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
14/32
Embedding A Mark into Flow Rate
Changes
Flow
Mark
1
1
1 -1 1 -1 -1
Mark decides flow rate changes
The key to make flow rate changes “invisible” and
“robust” is selecting an appropriate mark
Direct Sequence Spread Spectrum (DSSS)
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
15/32
Basic Direct Sequence Spread
Spectrum (DSSS)
A pseudo-noise code is used for spreading
a signal and despreading the spread signal
Interferer
Original
Signal
dt
Sniffer
rb
tb
ct
PN Code
Spreading
Wuhan Univ., 9/17/2008
noisy
channel
dr
Recovered
Signal
cr
PN Code
Despreading
Dong Xuan/The Ohio-State Univ.
16/32
Example – Spreading and Despreading
Signal dt: 1 -1
PN code (i.e. DSSS code ) ct: 1 1 1 -1 1 -1 -1
Spread signal tb=dt.ct=1 1 1 -1 1 -1 -1 -1 -1 -1 1 -1 1 1
One symbol is “represented” by 7 chips
PN code is random and not visible in time and frequency domains
tb is the mark!
Despreading is the reverse process of spreading
+1
dt
t
-1
tb
Tc (chip)
t
+1
ct
t
-1
Mark
NcTc
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
17/32
Invisibility of Flow Marking
Marks show a white noise-like pattern in
both time and frequency domains
Mark amplitude can be very small
Suspects don’t know the code, it is very
difficult for them to recognize marks
+1
dt
t
-1
tb
Tc (chip)
+1
ct
t
-1
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
Mark
18/32
Accuracy of Flow Marking Recognition
Spread/despread processes make the mark
immune to burst interference introduced by
internet background traffic
+1
dt
t
-1
tb
Tc (chip)
+1
ct
t
-1
Mark
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
19/32
A Prototype System
Sender
Receiver
Anonymous
Network
Flow Modulator
Flow Demodulator
Signal Modulator
Signal Modulator
Signal (e.g., 1 -1)
Recovered Signal
Interferer
Wuhan Univ., 9/17/2008
Sniffer
Dong Xuan/The Ohio-State Univ.
20/32
Embedding Signal into Traffic at
Interferer
Choose a random signal
of length n: (1 -1)
2. Signal modulator: obtain
the spread signal
Signal
1.
Signal
Modulator
PN
Code
(1 1 1 -1 1 -1 -1 -1 -1 -1 1 -1 1 1)
Flow
Modulator
3. Flow modulator: modulate a
target traffic flow by
appropriate interference
Bit 1: without interference
Bit -1: with interference
Internet
spread signal + noise
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
21/32
Recovering Signal at Sniffer
1.
Flow demodulator:
Sniff the target traffic
Sample target traffic to derive
traffic rate time series
Use high-pass filter to remove
direct component by Fast
Fourier Transform (FFT)
spread signal + noise
Flow Demodulator
High-pass
Filter
PN
Code
2. Signal demodulator:
Despreading by the PN code
Use low-pass filter to remove
high-frequency noise
(1 -1)
3. Decision rule:
Recovered signal == Original
signal?
Wuhan Univ., 9/17/2008
Low-pass
Filter
Signal Demodulator
Decision
Rule
Dong Xuan/The Ohio-State Univ.
22/32
Analytical Results
1 bit signal detection rate: the probability that we
recognize one signal bit if we know when the signal
appears
where erfc(.) is complementary error function, and
Nc is the PN code length
n bit signal detection rate
Signal to Noise
Ratio (SNR)
(1)
A (2)
(3)
SNR influences accuracy as well as invisibility
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
23/32
Real World Experiment Setup
The flow modulator at the interferer uses denial of service
attack in wired networks
Tor: a popular anonymous network on the Internet
(http://www.torproject.org/)
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
24/32
Evaluation Setup
Sender
Receiver
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
25/32
Traceback Invisibility
Overlapping Traffic Rate Curves for Traffic without Marks
and with Marks in Time and Frequency Domains
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
26/32
Traceback Accuracy
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
27/32
Turning into A Real World Tool
Remaining issues
Not totally invisible
Not accurate to low rate traffic
Robustness
Applied to different scenarios
One-to-one => group
• Orthogonal codes => parallel flow marking
Wireless/wired networks
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
28/32
Related Work
IP packet marking based traceback (UC Berkeley, Purdue Univ.) [1,
2]
Have routers on the path add its IP address to packet; victim will read
path from the packet
Disadvantage: require extra space in the packet; need network
infrastructure involve
Packet interval arrival time based traceback (North Carolina State
Univ., George Mason Univ.) [3, 4]
Adjust the packet interval time conveying information
Advantage: fewer packets
Disadvantage: sensitive to interference; need of more controlled
network segments
Correlation based traceback (UT-Arlington, Univ. of Cambridge) [5,
6]
Correlate traffic at different locations (passively or actively)
Advantage: passive and no interference of target traffic (good
secrecy)
Disadvantage: need of a threshold to determine whether traffic at at
different locations is related
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
29/32
Final Remarks
Invisible traceback is important but hard
We develop a novel traceback technique
based on flow marking with Spread
Spectrum
We prototype a system based on the above
technique
Our technique possesses a high potential to
be further developed into a real-world tool
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
30/32
References
[1] D. X. Song and A. Perrig, “Advanced and authenticated marking schemes
for IP traceback”, in Proc. of IEEE Infocom, 2001
[2] K. Park and H. Lee, “On the Effectiveness of Probabilistic Packet
Marking for IP Traceback under Denial of Service Attack”, in proc. of
IEEE Infocom 2001.
[3] X. Wang, S. Chen, , and S. Jajodia, “Tracking anonymous peer-to-peer
voip calls on the internet,” in Proc. of the 12th ACM Conference on
Computer Communications Security (CCS), 2005.
[4] P. Peng, P. Ning, and D. S. Reeves, “On the secrecy of timing-based
active watermarking trace-back techniques,” in Proc. of the IEEE
Security and Privacy Symposium (S&P), 2006.
[5] Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, “On flow correlation
attacks and countermeasures in mix networks,” in Proc. of Workshop on
Privacy Enhancing Technologies (PET), 2004.
[6] B. N. Levine, M. Reiter, C. Wang, and M. Wright, “Timing analysis in lowlatency mix systems,” in Proc. of the 8th International Conference on
Financial Cryptography, 2004.
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
31/32
Thank You !
Questions?
Wuhan Univ., 9/17/2008
Dong Xuan/The Ohio-State Univ.
32/32