Top Banner
FEARLESS engineering http://hightechforum.org/tag/privacy/ Can we overcome this …
50

Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

Jun 30, 2018

Download

Documents

vokhanh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

http://hightechforum.org/tag/privacy/

Can we overcome this …

Page 2: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

With this?

Page 3: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Actually …

Tor

Page 4: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Can we overcome this …

The real question is:

Page 5: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

… using fingerprinting?

Page 6: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

UT DALLAS Erik Jonsson School of Engineering & Computer Science

FEARLESS engineering

Khaled Al-Naami Swarup Chandra Ahmad MustafaLatifur Khan Zhiqiang Lin Kevin Hamlen Bhavani

Thuraisingham

Adaptive Encrypted Traffic Fingerprinting

With Bidirectional Dependence

This work is funded by NSF, AFOSR, and NSA.

Page 7: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Outline

• Attack

• BIND

• Defenses

• Experiments

• Base rate fallacy

• Adaptive Learning

Page 8: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Outline

Page 9: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Traffic fingerprinting

Page 10: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Website Fingerprinting (WFP)

• A Traffic Analysis (TA) attack.

• Threatens web navigation privacy.

• Attackers learn information about a website accessed by the user.

• Website = Fingerprint = Signature

Page 11: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Website Fingerprinting

• The Goal is to identify the websites

• Can also help identify threats– Bad people

• Can harm certain individuals – Journalists

– Activists

– Bloggers

Page 12: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

WFP Diagram – Tor

Page 13: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

How about mobile apps?

• Apps Fingerprinting

• Threatens apps navigation privacy.

• Attackers learn information about apps accessed by the user.

• App = Fingerprint = Signature

Page 14: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

App Fingerprinting

• Marketing view:– advertisement

– network bandwidth management

– app recommendations

• Adversarial view:– targeted attacks on well-known vulnerable apps

Page 15: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Apps Fingerprinting

Page 16: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Encrypted Data

Page 17: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Outline

Page 18: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

BIND: fingerprinting with BI-directioNal Dependence

BIND

Page 19: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

BIND

Observation is that traffic exchanged in the two directions of a connection depend upon each other.

Therefore, design a new fingerprinting mechanism (BIND)that leverages this sequence dependence.

Page 20: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Page 21: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Outline

Page 22: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Arms Race

Defenders morph packets

AttackersBIND

Page 23: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Attackers and Defenders – Arms Race

• The competition between attackers and defenders is continually evolving

• Attackers collect the packets and apply ML.

• Defenders morph packets (website A to look like website B)

• The coarser the features, the more resistant

• BIND: coarse-feature approach

Page 24: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Defenses (DTS – Distribution-Based)

• DTS: Direct Target Sampling– A: Src Webpage B: Target Webpage– DA and DB (Packet Length Distributions)

– For every packet of length i from A sample packet of length j from DB

• if j > i then pad i to j and send

• else send i

• Continue sampling by adding dummy packets until distance L1(A’, B) < 0.3

Page 25: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Defenses (TM - Distribution-Based)

• TM: Traffic Morphing– Similar to DTS but sample to pad packets using convex optimization (to minimize

padding overhead)

– Y = AXProbabilities to be calc.pmf of target pmf of source

s: packet size

Page 26: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Defenses (TM - Distribution-Based)

• Continue sampling by adding dummy packets until distance L1(A’, B) < 0.3

Page 27: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Page 28: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Outline

Page 29: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Closed-world scenario

Page 30: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Open-world scenario

Page 31: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Closed-world vs Open-world

Item Closed-world Open-world

Set Finite set of websites - Monitored- Non-Monitored

Classification Multi-class (websites) Binary

Goal Predict website Predict if a Monitored or non-Monitored website

Universe -> ∞

M (Finite)

M’(Infinite & Diverse)

http://www.geeksforgeeks.org/getting-started-with-classification/

Closed-worldOpen-world

Page 32: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Datasets and setup

Page 33: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Apps dataset collection process

Page 34: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Summary of previous and proposed approaches

Page 35: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Closed world – w/o Defenses

Accuracy %

Page 36: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Open world – w/o Defenses

TPR and FPR %

Page 37: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Closed world – w/ Traffic Morphing Defense

Page 38: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Open world – w/ Traffic Morphing/Tamaraw

Page 39: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Running Time (cw)

Page 40: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Running Time (ow)

• WKNN and BINDWKNN (> 30 min) – due to weight computations.

• BINDRF (< 60 sec)

• Yet, BINDRF outperformed BINDWKNN (or WKNN)

Page 41: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Outline

Page 42: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Base Detection Rate (BDR) – Open-world

actual M -M

classifed

D tp fp -D fn tn

Page 43: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

BDR – prior probability of a targeted client

Page 44: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Outline

Page 45: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Adaptive Learning

Page 46: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Adaptive Learning

Page 47: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Adaptive Learning

Page 48: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Conclusion

• A coarse-feature extraction approach (BIND) over encrypted data– Capturing dependences between consecutive packet sequences

• Across multiple domains– HTTPS, Tor, Smartphone Apps

• Closed-world and open-world settings

• The approach is more resilient to defenses

• BDR

• Adaptive Learning

Page 49: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Future work

• Incremental Learning– Change Point Detection

• Multi-tab browsing– Tor

• New defenses– Work presented represents attacker

– Implementing a more successful defense that BIND can’t evade

Page 50: Can we overcome this - utdallas.eduswarup.chandra/slides/acsac16_presentation.pdf · Can we overcome this ... • TM: Traffic Morphing – Similar to DTS but sample to pad packets

FEARLESS engineering

Thank you!Questions?