15
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries Steven J. Murdoch 1, 2 Piotr Zieli ´ nski 1 www.cl.cam.ac.uk/users/{sjm217, pz215} 1 Computer Laboratory 2 OpenNet Initiative www.opennet.net 7th Workshop on Privacy Enhancing Technologies, 20–22 June 2007, Ottawa, Canada

Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Sampled Traffic Analysis byInternet-Exchange-Level Adversaries

Steven J. Murdoch 1, 2 Piotr Zielinski 1

www.cl.cam.ac.uk/users/{sjm217, pz215}

1

Computer Laboratory

2OpenNet Initiative

www.opennet.net

7th Workshop on Privacy Enhancing Technologies, 20–22 June 2007, Ottawa, Canada

Page 2: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

This talk shows the impact of Internetexchanges on anonymity

Traffic analysis of low-latencyanonymity systems

Internet exchanges as a trafficanalysis point

Performing traffic analysis withsampled data

0.0

0.2

0.4

0.6

0.8

1.0

attack methods

packets seen

succ

ess

rate

0.1 1 10 100 1000

full attack

durationsrate &overlaprate only

0.0

0.2

0.4

0.6

0.8

1.0

variable delay

packets seen

succ

ess

rate

0.1 1.0 10.0 50.0

no delay30 s1 min2 min5 min Effectiveness of the attack

Page 3: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Connecting directly to a server leaksinformation about users’ behaviour

Anyone monitoring the client, server or the connection between themcan see that the client is accessing that server

Page 4: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Connecting directly to a server leaksinformation about users’ behaviour

Anyone monitoring the client, server or the connection between themcan see that the client is accessing that server

By routing the connection through intermediate nodes, the client’s on-line privacy is improvedX knows the client’s IP address; Z knows the server’s IP address, butno node can see both; the server only knows Z’s IP address

Page 5: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Tor hides content but not data rate so isvulnerable to traffic analysis

Layered encryption makes data entering and leaving a node unlinkable

Page 6: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Tor hides content but not data rate so isvulnerable to traffic analysis

Layered encryption makes data entering and leaving a node unlinkableBut data rate is unchanged so traffic analysis can correlate flows

Page 7: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Location diversity can resist trafficanalysis by a partial adversary

Jurisdictional model: attacker can monitor nodes in some countries

Page 8: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Location diversity can resist trafficanalysis by a partial adversary

Jurisdictional model: attacker can monitor nodes in some countriesAS (autonomous system) model: attacker can monitor traffic flowingthrough some ISPs [Feamster & Dingledine]

Page 9: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Location diversity can resist trafficanalysis by a partial adversary

Jurisdictional model: attacker can monitor nodes in some countriesAS (autonomous system) model: attacker can monitor traffic flowingthrough some ISPs [Feamster & Dingledine]IX model: attacker can monitor links passing through some points

Page 10: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Internet exchanges are strategicallypowerful locations for traffic analysis

AS name Paths %

Level 3 1 961 22%NTL 1 445 16%Zen 1 258 14%JANET 1 224 14%...

Internet exchange Paths %

LINX 2 392 27%DE-CIX 231 3%AMS-IX 202 2%

For Tor nodes in the UK, the LINX (London Internet Exchange) is onmore paths than any other ISPLINX records and stores (partial) data from some of their coreswitches, and it is planned to be used for detecting spammersAMS-IX records data too, but only used for generating statistics

Page 11: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Traffic data can be used to link flows,but only sampled data may be available

Attacker’s goal is to establish probability that each output flow corre-sponds to the input flow of interest

Page 12: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Traffic data can be used to link flows,but only sampled data may be available

Attacker’s goal is to establish probability that each output flow corre-sponds to the input flow of interestFor fast links only sampled data is available (1 in 2 048 for LINX)

Page 13: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Bayesian analysis shows only flowrates and overlap are significant

input packets seen

mat

ch p

roba

bilit

y

0 2 4 6 8 10 12 14

0

0.001

0.01

0.1

1

mat

ch p

roba

bilit

y

first packet seen

last

pac

ket s

een

−25 −20 −15 −10 −5 0 5 10 15

−5

0

5

10

15

20

25

30

35

Match probability high when• input and output rates similar• amount of overlap high

input

output

0 5 10 15

Page 14: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

Results of analysis show high accuracyand resistance to moderate delay

0.0

0.2

0.4

0.6

0.8

1.0

attack methods

packets seen

succ

ess

rate

0.1 1 10 100 1000

full attack

durationsrate &overlaprate only

0.0

0.2

0.4

0.6

0.8

1.0

variable delay

packets seen

succ

ess

rate

0.1 1.0 10.0 50.0

no delay30 s1 min2 min5 min

Using both rate and amount of overlap significantly improves theaccuracy of results; (50% success rate after ≈10 MB of traffic)Introducing up to 30 seconds of latency to flows has no significanteffect on the matching algorithm

Page 15: Sampled Traffic Analysis by Internet-Exchange-Level …This talk shows the impact of Internet exchanges on anonymity Traffic analysis of low-latency anonymity systems Internet exchanges

In summary, Internet exchanges areideal locations for traffic analysis

• Internet exchanges are present on a high proportion of Internetconnections and may have the capability for collecting traffic data

• Sampled data, possible to collect with existing networkequipment, is very effective in de-anonymising flows

Future work• Develop improved defences

• Because the timing of individual packets is not a relevant factor,introducing moderate latency does not mitigate the attack

• Dummy traffic is more promising, but comes with a high cost• Paths could be selected to maintain Internet exchange diversity

• Refine limits of the attack’s effectiveness• Simulate with more realistic (non-Poisson) traffic• Analyze traffic within the anonymity network• Consider more information (e.g. sequence numbers in sFlow)