11
Measuring and Mitigating AS-level Adversaries Against Tor Rishab Nithyanand Oleksii Starov Phillipa Gill Michael Schapira Adva Zair

Measuring and Mitigating AS-level Adversaries Against Tor · 9/10/2017  · Websites Attacked (%) Country ts Main circuit Any circuit How vulnerable is vanilla Tor? Main Circuit:

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

  • MeasuringandMitigatingAS-levelAdversariesAgainstTor

    RishabNithyanand

    OleksiiStarov

    PhillipaGill

    MichaelSchapira

    AdvaZair

  • Network-levelTrafficCorrelationAttacks

    Source

    Entry Exit

    ASRouter

    Des0na0on

    Internetrou,ngisasymmetric.Source->Entry!=Entry->Source

    RAPTOR(USENIXSecurity2015):AnyASon(SourceàEntryOREntryàSource)AND(ExitàDestORDestàExit)

    isinaposi,ontolaunchatrafficcorrela,onaMack

  • MeasuringNetwork-levelAdversaries

    Goal:Quan,fythethreatfromnetwork-leveladversaries

    Approach:Iden,fyASesonA,B,C,andD•  ADV={(𝐴 ∪𝐵) ∩(𝐶 ∪𝐷)}

    Challenge:TraceroutesonlyletusobtainA

    Source Des0na0onEntry Exit

    A C

    B D

  • MeasuringNetwork-levelAdversariesOurApproach:Sphericalcows!•  Makeassump,onsaboutInternetrou,ng.•  ObtainapproximateAS-levelpaths.

    Approxima0ngASesonapath(offline):•  ASTopology:36KASes+126Krela,onships•  Useinter-ASrela,onships(customer,peer,provider)todecidewhetheranASwillrouteviaanother•  Rou,ngthroughcustomers>peers>providers,thenprefershortestpaths

    •  Iftherearemul,pleop,ons,weconsiderallofthem•  (seepaperforvalida,on)

  • MeasuringNetwork-levelAdversaries

    10Countries:BR,CN,DE,ES,FR,GB,IR,IT,RU,US200websites/country:LocalAlexaT-100+100Ci,zenLabsensi,vepagesAdversaries:Network-level,colludingnetwork-level(seepaper),andstate-level

  • MeasuringNetwork-levelAdversaries

    0

    20

    40

    60

    80

    100

    BR CN DE ES FR GB IR IT RU US All

    Web

    site

    s At

    tack

    ed (%

    )

    Country

    Main circuit Any circuit

    Frac0o

    nofweb

    sitesw

    ith

    vulnerab

    lecirc

    uits

    HowvulnerableisvanillaTor?MainCircuit:Circuitcarryingfirst“GET”requestisvulnerableAnyCircuit:Circuitcarryinganyrequestisvulnerable

    Network-levelAdversary

    Frac0o

    nofweb

    sitesw

    ith

    vulnerab

    lecirc

    uits

    State-levelAdversary

    0 20 40 60 80

    100

    BR CN DE ES FR GB IR IT RU US AllWeb

    site

    s A

    ttac

    ked

    (%)

    Country

    Main circuit Any circuit

  • MeasuringNetwork-levelAdversaries

    CanAS-awarerelayselec0onhelp?•  >20000(source,des,na,on)ASpairsineachcountry•  Consider1000*1000available(entry,exit)pairs•  Whatfrac0onofthe20000(source,des0na0on)pairshaveat

    mostx%oftheir1million(entry,exit)pairssafefromnetwork-levelthreats?

    BAD

    GOOD

    YES!

  • Astoria:ThisAS-awareTorclientisalright

    1.Convert(source,des,na,on)IPstoASNs

    2.Compute“safe-op,ons”fromall|entry-guard|*|legal-exits|op,ons

    3.Selectoneofthe“safe-op,ons”4.Constructandusecircuit

    MeasurementToolkit

    IP-ASNDatabase

    OFFLINE

    Whatiftherearenosafeop0ons?AstoriausesanLPtominimizenumberofcircuitsthatarevulnerabletoanysingleadversary.(seepaper)

  • Astoria:SecurityEvaluation

    Network-levelAdversary

    any:53%->8%main:37%->3%

    State-levelAdversary

    any:88%->34%main:82%->27%

  • Astoria:PerformanceEvaluation

    Page-load0mesTor:5.9sec

    Astoria:8.3secUniform:15.6sec

    LoadbalancingSimilartoTor*

    0

    0.2

    0.4

    0.6

    0.8

    1

    0 5 10 15 20 25 30

    Cum

    ulat

    ive

    Prob

    abili

    ty

    Page Load Time (sec)

    AstoriaVanilla Tor

    Uniform Tor

    0

    0.2

    0.4

    0.6

    0.8

    1

    0 2 4 6 8 10 12 14

    Cum

    ulat

    ive

    Prob

    abili

    ty

    Relay Bandwidth (MB/s)

    Available relaysPerfect load balancing client

    AstoriaVanilla Tor

    Uniform Tor

  • Conclusions•  Offlinepath-predic,ontoolkittomeasureTorvulnerability•  SignificantlybeMersecurityagainstnetwork-leveladversaries•  Cutsnumberofvulnerablewebsitestolessthan1/4th•  Effec,velydealswithworst-casesitua,ons

    •  Loadbalancing:SimilartoTor•  Page-load,mes:BeMerthanuniform,worsethanTor•  Mainproblem:Cannotpre-buildcircuitslikeTor

    •  Arguablyweakeragainstrelay-leveladversaries(seepaper)