Top Banner
Preserving Caller Anonymity in Voice-over-IP Networks Mudhakar Srivatsa, Ling Liu and Arun Iyengar Presented by Mounica Atluri
40

Preserving Caller Anonymity in Voice-over-IP Networks

Feb 23, 2016

Download

Documents

minya

Preserving Caller Anonymity in Voice-over-IP Networks. Mudhakar Srivatsa, Ling Liu and Arun Iyengar Presented by Mounica Atluri. Agenda. Voice-over-IP Attacks Proposed solution Experimental Evaluation Conclusion. Voice and data communication. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Preserving Caller Anonymity in Voice-over-IP  Networks

Preserving Caller Anonymity in

Voice-over-IP NetworksMudhakar Srivatsa, Ling Liu and Arun Iyengar

Presented by Mounica Atluri

Page 2: Preserving Caller Anonymity in Voice-over-IP  Networks

Voice-over-IP Attacks Proposed solution Experimental Evaluation Conclusion

Agenda

Page 3: Preserving Caller Anonymity in Voice-over-IP  Networks

Data transmission through Public switched telephone network

Uses Circuit switched networks

Expensive

Voice and data communication

Page 4: Preserving Caller Anonymity in Voice-over-IP  Networks

We see people talking through Skype, Vonage, instant messengers

Technology behind is called VoIP Transmission of voice traffic over  IP-based

networks Sounds are recorded and compressed Benefit of VoIP: Very economical

What is VoIP ?

Page 5: Preserving Caller Anonymity in Voice-over-IP  Networks

Caller anonymity and QoS

Existing approaches use Mix networks

Mix networks route traffic through nodes with random delays and random routes

For example, Onion routing

VoIP Requirements

Page 6: Preserving Caller Anonymity in Voice-over-IP  Networks

Other examples are Tor, Freedom and Tarzan

Mix networks cannot accommodate the QoS requirement

Low latency apps are vulnerable to timing attacks

VoIP Requirements

Page 7: Preserving Caller Anonymity in Voice-over-IP  Networks

Uses RTP for data transmission

Route Set Up protocol for call set up and termination

Protocols in VoIP

Page 8: Preserving Caller Anonymity in Voice-over-IP  Networks

Operates in four steps1. initSearch: initiates a route set up request2. processSearch: processes a route set up request3. processResult: processes the results of a route set

up request4. finSearch: concludes the route set up procedure

Route set up protocol

Page 9: Preserving Caller Anonymity in Voice-over-IP  Networks

src initiates a request by broadcasting

initSearch

src

dst

Page 10: Preserving Caller Anonymity in Voice-over-IP  Networks

If p receives a request from q, it checks if the sipurl is the url of the client connected to p.

processSearch

src

dst

p

Page 11: Preserving Caller Anonymity in Voice-over-IP  Networks

If p receives result (searchId, q), it searches for <searchId, sipurl, prev>, adds <sipurl, q> and forwards result to prev

processResult

src

dst p

Page 12: Preserving Caller Anonymity in Voice-over-IP  Networks

If src receives result, it adds <dst, q> to its routing table

finSearch

src

dst

q

Page 13: Preserving Caller Anonymity in Voice-over-IP  Networks

Encryption with shared symmetric key Exposes dst (through dst.sipurl) dst adds a random delay src or dst can be inferred if all of their

neighboring nodes are malicious

Security features of Route setup protocol

Page 14: Preserving Caller Anonymity in Voice-over-IP  Networks

Triangulation based timing attacks

3 steps in triangulation based timing attacks• Candidate caller detection: malicious nodes

deduce a list of potential callers

• Candidate caller ranking: malicious nodes associate a score with every potential caller

• Triangulation: Colluding malicious nodes combine their sets to obtain more accurate list of callers.

Caller Identification attacks

Page 15: Preserving Caller Anonymity in Voice-over-IP  Networks

Deterministic triangulation attack Statistical triangulation attack Differential triangulation attack

Three timing attacks

Page 16: Preserving Caller Anonymity in Voice-over-IP  Networks

2 assumptions• Link latencies are deterministic• All nodes are synchronized

2 properties of route setup protocol• Protocol establishes shortest route between the src and dst

• Node p that receives route set up request originated from src can estimate dist(src, p)

Deterministic triangulation attack

Page 17: Preserving Caller Anonymity in Voice-over-IP  Networks

Candidate caller detection• Compute S(p) for all s ∈ S(p),

Deterministic triangulation attack

Page 18: Preserving Caller Anonymity in Voice-over-IP  Networks

Candidate caller ranking• Compute the score

Triangulation• Compute the final score

Deterministic triangulation attack

Page 19: Preserving Caller Anonymity in Voice-over-IP  Networks

Deterministic triangulation attack

Page 20: Preserving Caller Anonymity in Voice-over-IP  Networks

Link latencies are independently distributed Length of a path P is given by

In candidate caller detection, p computes a set of Pareto-optimal distances to all nodes v

A set of path lengths d1, d2.. dm is Pareto-optimal if for all other path lengths d,

Statistical triangulation attack

Page 21: Preserving Caller Anonymity in Voice-over-IP  Networks

A node v is marked as a candidate caller if

If link latencies follow Gaussian, the path latencies follow Gaussian too

Score of v can be computed as

For other any other distribution, use Chebyshev’s inequality to compute

Statistical triangulation attack

Page 22: Preserving Caller Anonymity in Voice-over-IP  Networks

In Triangulation step, the aggregate score for a candidate caller v is computed

Statistical triangulation attack

Page 23: Preserving Caller Anonymity in Voice-over-IP  Networks

Eliminates time stamp ts from the route set up request

Malicious nodes can estimate the difference

In candidate caller detection, malicious node p computes statistical shortest distances to every other node v as

Differential triangulation attack

Page 24: Preserving Caller Anonymity in Voice-over-IP  Networks

Statistical distance distpq[v] is given by distp[v] – distq[v]

v is a candidate caller if

If the link latency distribution is Gaussian, the score of v is given by

Finally, the average score for v is computed

Differential triangulation attack

Page 25: Preserving Caller Anonymity in Voice-over-IP  Networks

Network topology should be known for Timing attacks

Achieved by ping and pong messages

Topology Discovery

x yping(x,all)

pong(y, x)

y´pong(y´,x)

Page 26: Preserving Caller Anonymity in Voice-over-IP  Networks

Experimental set up• A synthetic network with 1024 nodes • Topology was constructed using NS-2 topology

generator• Node-to-node round trip times varies from 24ms-

150ms with a mean of 74ms

Evaluation of the Threat models

Page 27: Preserving Caller Anonymity in Voice-over-IP  Networks

Deterministic Triangulation• Number of suspects varies with number of

malicious nodes• Epsilon should not be too small or large

Page 28: Preserving Caller Anonymity in Voice-over-IP  Networks

Statistical Triangulation• More effective than deterministic when there are

uncertainties in link latencies

Page 29: Preserving Caller Anonymity in Voice-over-IP  Networks

Differential Triangulation• Statistical attack performs better if the clocks are

synchronized• Differential triangulation can achieve a top-10

probability of 0.78 with only 10 malicious nodes

Page 30: Preserving Caller Anonymity in Voice-over-IP  Networks

Topology Discovery• With m=20 and ttl=2, about 75% of the topology

is discovered

Page 31: Preserving Caller Anonymity in Voice-over-IP  Networks

Latency perturbation• each node adds random delay

Random Walk Search Algorithm• Resilient to timing attacks but generates

suboptimal routes

Hybrid route set up• Trade off anonymity with QoS

Countering timing attacks

Page 32: Preserving Caller Anonymity in Voice-over-IP  Networks

Sends a search request to a randomly chosen neighbor

Two key properties• Markovian property• Random walker does not traverse the shortest

path between any two nodes

Random Walk Search Algorithm

Page 33: Preserving Caller Anonymity in Voice-over-IP  Networks

Controlled Random Walk• Combination of two protocols• γ limits the length of random walk• Starts with random walk search• Switches to broadcast search with probability 1-γ

Hybrid route setup protocols

q

Page 34: Preserving Caller Anonymity in Voice-over-IP  Networks

Multi-Agent Random Walk• Similar to random walk• Src sends ω random walkers (ω >1)• Route is established when the first random walker

reaches dst• Higher ω results in optimal route latency• Vulnerable to triangulation based timing attack if src sends out random walkers at time t=0

Hybrid route setup protocols

Page 35: Preserving Caller Anonymity in Voice-over-IP  Networks

Performed on 1024-node synthetic VoIP network topology using NS-2

Algorithms implemented using Phex: an open source Java based implementation of peer-to-peer broadcast based route set up protocol

Experimental evaluation

Page 36: Preserving Caller Anonymity in Voice-over-IP  Networks

Performance• Characterized by cost of messaging

QoS guarantees• Routes with latency<250ms satisfy QoS

requirements• Larger route set up latency does not affect the

quality of voice conversation

Page 37: Preserving Caller Anonymity in Voice-over-IP  Networks

Optimal parameter settings

Attack resilience• 99% optimal parameter settings

Page 38: Preserving Caller Anonymity in Voice-over-IP  Networks

Topology discovery• Only fraction of topology has been discovered• Top-10 probability for marw was 42% less, crw was

33% less and broadcast was only 9% less • Random walk protocols are more sensitive to

topology

Page 39: Preserving Caller Anonymity in Voice-over-IP  Networks

VoIP in becoming popular due to its advantages in cost and convenience

It is a major concern to provide anonymity to the clients

Threat models targeting callers’ anonymity are efficient

Even if a small fraction of network is malicious, the caller can be inferred accurately

It is difficult to trade QoS with anonymity

Conclusion

Page 40: Preserving Caller Anonymity in Voice-over-IP  Networks

QUESTIONS??