Can we overcome. FEARLESS engineering
|
|
- Rose Heath
- 5 years ago
- Views:
Transcription
1 Can we overcome this
2 With this?
3 Actually Tor
4 The real question is: Can we overcome this
5 using fingerprinting?
6 UT DALLAS Erik Jonsson School of Engineering & Computer Science Adaptive Encrypted Traffic Fingerprinting With Bidirectional Dependence Khaled Al-Naami Latifur Khan Swarup Chandra Ahmad Mustafa Zhiqiang Lin Kevin Hamlen Bhavani Thuraisingham This work is funded by NSF, AFOSR, and NSA.
7 Outline Attack BIND Defenses Experiments Base rate fallacy Adaptive Learning
8 Outline
9 Traffic fingerprinting
10 Website Fingerprinting (WFP) A Traffic Analysis (TA) attack. Threatens web navigation privacy. Attackers learn information about a website accessed by the user. Website = Fingerprint = Signature
11 Website Fingerprinting The Goal is to identify the websites Can harm certain individuals Journalists Activists Bloggers Can also help identify threats Bad people
12 WFP Diagram Tor
13 How about mobile apps? Apps Fingerprinting Threatens apps navigation privacy. Attackers learn information about apps accessed by the user. App = Fingerprint = Signature
14 App Fingerprinting Adversarial view: targeted attacks on well-known vulnerable apps Marketing view: advertisement network bandwidth management app recommendations
15 Apps Fingerprinting
16 Encrypted Data
17 Outline
18 BIND: fingerprinting with BI-directioNal Dependence BIND
19 BIND Observation is that traffic exchanged in the two directions of a connection depend upon each other. Therefore, design a new fingerprinting mechanism (BIND) that leverages this sequence dependence.
20
21 Outline
22 Arms Race Defenders morph packets Attackers BIND
23 Attackers and Defenders Arms Race The competition between attackers and defenders is continually evolving Attackers collect the packets and apply ML. Defenders morph packets (website A to look like website B) The coarser the features, the more resistant BIND: coarse-feature approach
24 Defenses (DTS Distribution-Based) DTS: Direct Target Sampling A: Src Webpage B: Target Webpage DA and DB (Packet Length Distributions) For every packet of length i from A sample packet of length j from DB if j > i then pad i to j and send else send i Continue sampling by adding dummy packets until distance L1(A, B) < 0.3
25 Defenses (TM - Distribution-Based) TM: Traffic Morphing Similar to DTS but sample to pad packets using convex optimization (to minimize padding overhead) Y = AX pmf of target Probabilities to be calc. pmf of source s: packet size
26 Defenses (TM - Distribution-Based) Continue sampling by adding dummy packets until distance L1(A, B) < 0.3
27
28 Outline
29 Closed-world scenario
30 Open-world scenario
31 Closed-world vs Open-world Item Closed-world Open-world Set Finite set of websites - Monitored - Non-Monitored Classification Multi-class (websites) Binary Goal Predict website Predict if a Monitored or nonmonitored website Universe -> M M Closed-world (Finite) Open-world (Infinite & Diverse)
32 Datasets and setup
33 Apps dataset collection process
34 Summary of previous and proposed approaches
35 Closed world w/o Defenses Accuracy %
36 Open world w/o Defenses TPR and FPR %
37 Closed world w/ Traffic Morphing Defense
38 Open world w/ Traffic Morphing/Tamaraw
39 Running Time (cw)
40 Running Time (ow) WKNN and BINDWKNN (> 30 min) due to weight computations. BINDRF (< 60 sec) Yet, BINDRF outperformed BINDWKNN (or WKNN)
41 Outline
42 Base Detection Rate (BDR) Open-world actual classif ed D -D M tp fn -M fp tn
43 BDR prior probability of a targeted client
44 Outline
45 Adaptive Learning
46 Adaptive Learning
47 Adaptive Learning
48 Conclusion A coarse-feature extraction approach (BIND) over encrypted data Capturing dependences between consecutive packet sequences Across multiple domains HTTPS, Tor, Smartphone Apps Closed-world and open-world settings The approach is more resilient to defenses BDR Adaptive Learning
49 Future work Incremental Learning Change Point Detection Multi-tab browsing Tor New defenses Work presented represents attacker Implementing a more successful defense that BIND can t evade
50 Thank you! Questions?
Adaptive Encrypted Traffic Fingerprinting With Bi-Directional Dependence
Adaptive Encrypted Traffic Fingerprinting With Bi-Directional Dependence Khaled Al-Naami, Swarup Chandra, Ahmad Mustafa, Latifur Khan, Zhiqiang Lin, Kevin Hamlen, and Bhavani Thuraisingham Computer Science
More informationBig Stream Data Analytics: Current & Future Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Big Stream Data Analytics: Current & Future Trends Latifur Khan Professor, Department of Computer Science The University of Texas at Dallas
More informationAn Adaptive Framework for Multistream Classification
An Adaptive Framework for Multistream Classification Swarup Chandra, Ahsanul Haque, Latifur Khan and Charu Aggarwal* University of Texas at Dallas *IBM Research This material is based upon work supported
More informationCan t you hear me knocking
Can t you hear me knocking Identification of user actions on Android apps via traffic analysis Candidate: Supervisor: Prof. Mauro Conti Riccardo Spolaor Co-Supervisor: Dr. Nino V. Verde April 17, 2014
More informationAn Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree
An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree P. Radoglou-Grammatikis and P. Sarigiannidis* University of Western Macedonia Department of Informatics & Telecommunications
More informationDiverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier
Diverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier Perform differently in different environments No Free Lunch Theorem Combine
More informationCan t You Hear Me Knocking: Security and Privacy Threats from ML Application to Contextual Information
Can t You Hear Me Knocking: Security and Privacy Threats from ML Application to Contextual Information Contextual Security Workshop Contextual Security: Quo Vadis? Aalto University, Helsinki - December
More informationPort-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009
Port-Scanning Resistance in Tor Anonymity Network Presented By: Shane Pope (Shane.M.Pope@gmail.com) Dec 04, 2009 In partial fulfillment of the requirements for graduation with the Dean's Scholars Honors
More informationImpact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks Claudia Diaz 1, Steven J. Murdoch 2, Carmela Troncoso 1 1 K.U.Leuven, ESAT/COSIC 2 University of Cambridge / The Tor
More informationMetrics for Security and Performance in Low-Latency Anonymity Systems
Metrics for Security and Performance in Low-Latency Anonymity Systems Tor user Entry node Tor Network Middle node Exit node Bandwidth per node (kb/s) (log scale) 1e+01 1e+03 1e+05 Encrypted tunnel Web
More informationEffective Attacks and Provable Defenses for Website Fingerprinting
Effective Attacks and Provable Defenses for Website Fingerprinting Tao Wang 1 Xiang Cai 2 Rishab Nithyanand 2 Rob Johnson 2 Ian Goldberg 1 1 University of Waterloo 2 Stony Brook University {t55wang,iang}@cs.uwaterloo.ca
More informationIntroduction to Tor. January 20, Secure Web Browsing and Anonymity. Tor Mumbai Meetup, Sukhbir Singh
Introduction to Tor Secure Web Browsing and Anonymity Tor Mumbai Meetup, 2018 Sukhbir Singh sukhbir@torproject.org January 20, 2018 Before We Begin... 2 / 18 Before We Begin... Understand your threat model
More informationarxiv: v3 [cs.cr] 19 Feb 2016
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique arxiv:1509.00789v3 [cs.cr] 19 Feb 2016 Jamie Hayes University College London j.hayes@cs.ucl.ac.uk Abstract Website fingerprinting enables
More informationComprehensive datacenter protection
Comprehensive datacenter protection There are several key drivers that are influencing the DDoS Protection market: DDoS attacks are increasing in frequency DDoS attacks are increasing in size DoS attack
More informationk-fingerprinting: a Robust Scalable Website Fingerprinting Technique
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique Jamie Hayes University College London j.hayes@cs.ucl.ac.uk George Danezis University College London g.danezis@ucl.ac.uk Abstract Website
More informationk-fingerprinting: A Robust Scalable Website Fingerprinting Technique
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique Jamie Hayes and George Danezis, University College London https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/hayes
More informationDynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows
DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows ABSTRACT David Lu MIT PRIMES davidboxboro@gmail.com Albert Kwon MIT kwonal@mit.edu Website fingerprinting attacks
More informationBeauty and the Burst
Beauty and the Burst Remote Identification of Encrypted Video Streams Roei Schuster Cornell Tech, Tel Aviv University Vitaly Shmatikov Cornell Tech Eran Tromer Columbia University, Tel Aviv University
More informationRAPTOR: Routing Attacks on Privacy in Tor. Yixin Sun. Princeton University. Acknowledgment for Slides. Joint work with
RAPTOR: Routing Attacks on Privacy in Tor Yixin Sun Princeton University Joint work with Annie Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal Acknowledgment for Slides
More informationCircuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services
Circuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services Albert Kwon 1 Mashael Saad Al-Sabah 123 David Lazar 1 Marc Dacier 2 Srinivas Devadas 1 1 CSAIL/MIT 2 Qatar Computing Research
More informationEvaluating Classifiers
Evaluating Classifiers Reading for this topic: T. Fawcett, An introduction to ROC analysis, Sections 1-4, 7 (linked from class website) Evaluating Classifiers What we want: Classifier that best predicts
More informationAutomated Website Fingerprinting through Deep Learning
Automated Website Fingerprinting through Deep Learning Vera Rimmer 1, Davy Preuveneers 1, Marc Juarez 2, Tom Van Goethem 1 and Wouter Joosen 1 NDSS 2018 Feb 19th (San Diego, USA) 1 2 Website Fingerprinting
More informationCS4491/CS 7265 BIG DATA ANALYTICS
CS4491/CS 7265 BIG DATA ANALYTICS EVALUATION * Some contents are adapted from Dr. Hung Huang and Dr. Chengkai Li at UT Arlington Dr. Mingon Kang Computer Science, Kennesaw State University Evaluation for
More informationarxiv: v5 [cs.cr] 20 Aug 2018
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning arxiv:1801.02265v5 [cs.cr] 20 Aug 2018 ABSTRACT Payap Sirinam Rochester Institute of Technology Rochester, New York payap.sirinam@mail.rit.edu
More informationDetecting Drive-by-Download Attacks based on HTTP Context-Types Ryo Kiire, Shigeki Goto Waseda University
Detecting Drive-by-Download Attacks based on HTTP Context-Types Ryo Kiire, Shigeki Goto Waseda University 1 Outline Background Related Work Purpose Method Experiment Results Conclusion & Future Work 2
More informationPluggable Transports Roadmap
Pluggable Transports Roadmap Steven J. Murdoch and George Kadianakis steven.murdoch@cl.cam.ac.uk,asn@torproject.org Tor Tech Report 2012-03-003 March 17, 2012 Abstract Of the currently available pluggable
More informationOnlineAnonymity. OpenSource OpenNetwork. Communityof researchers, developers,usersand relayoperators. U.S.501(c)(3)nonpro%torganization
The Tor Project Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention.
More informationEvaluating Classifiers
Evaluating Classifiers Reading for this topic: T. Fawcett, An introduction to ROC analysis, Sections 1-4, 7 (linked from class website) Evaluating Classifiers What we want: Classifier that best predicts
More informationAvoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection
Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum Paul Syverson (U.S. Naval Research Laboratory) (U.S. Naval
More informationAnonymous Communication and Internet Freedom
Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner May 2, 2013 Goals For Today State-sponsored adversaries Anonymous communication Internet censorship State-Sponsored
More informationAnonymous Communication and Internet Freedom
Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner April 29, 2016 Announcements Final exam in RSF Fieldhouse, 5/10, arrive by 7PM HW4 due Monday, 5/2, 11:59pm Review
More informationPreventing Cryptographic Key Leakage in Cloud Virtual Machines
UT DALLAS Erik Jonsson School of Engineering & Computer Science Preventing Cryptographic Key Leakage in Cloud Virtual Machines Erman Pattuk Murat Kantarcioglu Zhiqiang Lin Huseyin Ulusoy Move to Cloud
More informationLecture 12. Application Layer. Application Layer 1
Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers
More informationExploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
S C I E N C E P A S S I O N T E C H N O L O G Y Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android Raphael Spreitzer, Simone Griesmayr, Thomas Korak, and Stefan Mangard IAIK,
More informationCSWAE Certified Secure Web Application Engineer
CSWAE Certified Secure Web Application Engineer Overview Organizations and governments fall victim to internet based attacks every day. In many cases, web attacks could be thwarted but hackers, organized
More informationAnonymous communications and systems
Anonymous communications and systems A short introduction George Danezis Computer Security Group Computer Laboratory 1 Introducing Hiding Two strategies to safeguard assets: protect (guards, walls, safes,
More informationPredicting Program Phases and Defending against Side-Channel Attacks using Hardware Performance Counters
Predicting Program Phases and Defending against Side-Channel Attacks using Hardware Performance Counters Junaid Nomani and Jakub Szefer Computer Architecture and Security Laboratory Yale University junaid.nomani@yale.edu
More informationCSC 574 Computer and Network Security. Firewalls and IDS
CSC 574 Computer and Network Security Firewalls and IDS Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by William Robertson) Firewalls Recognized early on that networklevel access control
More informationCSE484 Final Study Guide
CSE484 Final Study Guide Winter 2013 NOTE: This study guide presents a list of ideas and topics that the TAs find useful to know, and may not represent all the topics that could appear on the final exam.
More informationarxiv: v2 [cs.cr] 20 Sep 2017
How Unique is Your.onion? An Analysis of the Fingerprintability of Tor Onion Services Rebekah Overdorf Drexel University Philadelphia, Pennsylvania rebekah.overdorf@drexel.edu Marc Juarez ESAT-COSIC and
More informationTor: Online anonymity, privacy, and security.
Tor: Online anonymity, privacy, and security. Runa A. Sandvik runa@torproject.org 12 September 2011 Runa A. Sandvik runa@torproject.org () Tor: Online anonymity, privacy, and security. 12 September 2011
More informationBotnets Behavioral Patterns in the Network
Botnets Behavioral Patterns in the Network Garcia Sebastian @eldracote Hack.Lu 2014 CTU University, Czech Republic. UNICEN University, Argentina. October 23, 2014 How are we detecting malware and botnets?
More informationOUTLINE PERFORMANCE BENCHMARKING 7/23/18 SUB BENCHMARKING THE SECURITY OF SOFTWARE SYSTEMS OR TO BENCHMARK OR NOT TO BENCHMARK
BENCHMARKING THE SECURITY OF SOFTWARE SYSTEMS OR TO BENCHMARK OR NOT TO BENCHMARK mvieira@dei.uc.pt Department of Informatics Engineering University of Coimbra - Portugal QRS 2018 Lisbon, Portugal July
More informationList of Exercises: Data Mining 1 December 12th, 2015
List of Exercises: Data Mining 1 December 12th, 2015 1. We trained a model on a two-class balanced dataset using five-fold cross validation. One person calculated the performance of the classifier by measuring
More informationCertified Secure Web Application Engineer
Certified Secure Web Application Engineer ACCREDITATIONS EXAM INFORMATION The Certified Secure Web Application Engineer exam is taken online through Mile2 s Assessment and Certification System ( MACS ),
More informationDetecting Malicious Hosts Using Traffic Flows
Detecting Malicious Hosts Using Traffic Flows Miguel Pupo Correia joint work with Luís Sacramento NavTalks, Lisboa, June 2017 Motivation Approach Evaluation Conclusion Outline 2 1 Outline Motivation Approach
More informationTor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation.
Tor Hidden Services Roger Dingledine Free Haven Project Electronic Frontier Foundation http://tor.eff.org/ 31 July 2005 Talk Outline Tor overview Circuit-building in Tor Hidden services in Tor Demo Anonymity
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationOn Realistically Attacking Tor with Website Fingerprinting
Proceedings on Privacy Enhancing Technologies ; 2016 (4):21 36 Tao Wang* and Ian Goldberg On Realistically Attacking Tor with Website Fingerprinting Abstract: Website fingerprinting allows a local, passive
More informationEvading Network Anomaly Detection Sytems - Fogla,Lee. Divya Muthukumaran
Evading Network Anomaly Detection Sytems - Fogla,Lee Divya Muthukumaran Intrusion detection Systems Signature Based IDS Monitor packets on the network Compare them against database of signatures/attributes
More informationTor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson
Tor: The Second-Generation Onion Router Roger Dingledine, Nick Mathewson, Paul Syverson Introduction Second Generation of Onion Routing Focus on deployability Perfect forward secrecy Separation of protocol
More informationInternet Traffic Classification using Machine Learning
Internet Traffic Classification using Machine Learning by Alina Lapina 2018, UiO, INF5050 Alina Lapina, Master student at IFI, Full stack developer at Ciber Experis 2 Based on Thuy T. T. Nguyen, Grenville
More informationIntrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Intruders & Attacks Cyber criminals Activists State-sponsored organizations Advanced Persistent
More informationIntroduction Mapping the ELF Pinpointing Fragmentation Evaluation Conclusion. Bin-Carver. Automatic Recovery of Binary Executable Files
Bin-Carver Automatic Recovery of Binary Executable Files Scott Hand, Zhiqiang Lin, Guofei Gu*, Bhavani Thuraisingham Department of Computer Science, The University of Texas at Dallas *Deparment of Computer
More informationFast and Evasive Attacks: Highlighting the Challenges Ahead
Fast and Evasive Attacks: Highlighting the Challenges Ahead Moheeb Rajab, Fabian Monrose, and Andreas Terzis Computer Science Department Johns Hopkins University Outline Background Related Work Sampling
More informationarxiv: v1 [cs.cr] 30 Jun 2017
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices arxiv:1706.10220v1 [cs.cr] 30 Jun 2017 Abstract Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac Cyber-Physical Systems Security
More informationOutline. Traffic multipliers. DoS against network links. Smurf broadcast ping. Distributed DoS
Outline CSci 5271 Introduction to Computer Security Day 22: Anonymizing the network Stephen McCamant University of Minnesota, Computer Science & Engineering DoS against network links Traffic multipliers
More information68% 63% 50% 25% 24% 20% 17% Credit Theft. DDoS. Web Fraud. Cross-site Scripting. SQL Injection. Clickjack. Cross-site Request Forgery.
PRESENTED BY: Credit Theft 68% DDoS 63% Web Fraud 50% Cross-site Scripting SQL Injection Clickjack Cross-site Request Forgery 25% 24% 20% 17% Other 2% F5 Ponemon Survey -Me East-West Traffic Flows App
More informationCNT Computer and Network Security: Privacy/Anonymity
CNT 5410 - Computer and Network Security: Privacy/Anonymity Professor Kevin Butler Fall 2015 When Confidentiality is Insufficient 2 Privacy!= Confidentiality Confidentiality refers to the property of the
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationOn Demand secure routing protocol resilient to Byzantine failures
On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,
More informationDimensionality reduction as a defense against evasion attacks on machine learning classifiers
Dimensionality reduction as a defense against evasion attacks on machine learning classifiers Arjun Nitin Bhagoji and Prateek Mittal Princeton University DC-Area Anonymity, Privacy, and Security Seminar,
More informationDe-Anonymizing and Countermeasures in Anonymous Communication Networks
SECURITY AND PRIVACY IN EMERGING NETWORKS De-Anonymizing and Countermeasures in Anonymous Communication Networks Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu, and Wei Yu Ming Yang, Junzhou Luo, and Zhen
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationContext. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are!
Context Protocols for anonymity The nternet is a public network: Myrto Arapinis School of nformatics University of Edinburgh Routing information is public: P packet headers contain source and destination
More informationIntelligent and Secure Network
Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence
More informationAnonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L
Anonymity C S 6 8 2 A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L 2 0 1 9 Tor: The Second- Generation Onion Router R. DINGLEDINE N.
More informationWedge: Splitting Applications into Reduced-Privilege Compartments
Wedge: Splitting Applications into Reduced-Privilege Compartments Andrea Bittau Petr Marchenko Mark Handley Brad Karp University College London April 17, 2008 Vulnerabilities threaten sensitive data Exploits
More informationMaximum Security with Minimum Impact : Going Beyond Next Gen
SESSION ID: SP03-W10 Maximum Security with Minimum Impact : Going Beyond Next Gen Wendy Moore Director, User Protection Trend Micro @WMBOTT Hyper-competitive Cloud Rapid adoption Social Global Mobile IoT
More informationPeeling Onions Understanding and using
hiro@torproject.org Peeling Onions Understanding and using the network Know your onions What is Tor and what it can do for you. How Tor provides privacy and anonymity Using Tor at the application layer:
More informationWebsite Fingerprinting Defenses at the Application Layer
Proceedings on Privacy Enhancing Technologies ; 2017 (2):186 203 Giovanni Cherubin*, Jamie Hayes*, and Marc Juarez* Website Fingerprinting Defenses at the Application Layer Abstract: Website Fingerprinting
More informationSe Eun Oh*, Shuai Li, and Nicholas Hopper Fingerprinting Keywords in Search Queries over Tor
Proceedings on Privacy Enhancing Technologies ; 2017 (4):251 270 Se Eun Oh*, Shuai Li, and Nicholas Hopper Fingerprinting Keywords in Search Queries over Tor Abstract: Search engine queries contain a great
More informationInferring the Source of Encrypted HTTP Connections
Inferring the Source of Encrypted HTTP Connections Marc Liberatore Brian Neil Levine 1 Private Communications? Does link encryption provide privacy? VPNs, SSH tunnels, WEP/WPA, etc. 2 Anonymous Communication?
More informationCE Advanced Network Security Honeypots
CE 817 - Advanced Network Security Honeypots Lecture 12 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained
More informationLeveraging USB to Establish Host Identity
Leveraging USB to Establish Host Identity Adam Bates Kevin Butler Ryan Leonard Daniel Lowd Hanna Pruse NDSS 14, San Diego, CA, USA 25 February, 2014 Computer and Information Science Dude, ARE you getting
More informationROC in Assessing IDS Quality
ROC in Assessing IDS Quality Rune Hammersland {firstname.lastname}@hig.no Norwegian Information Security Lab, Gjøvik University College November 30, 2007 1 Terms For assessing the quality of IDS systems,
More informationDetecting malware even when it is encrypted
Detecting malware even when it is encrypted Machine Learning for network HTTPS analysis František Střasák strasfra@fel.cvut.cz @FrenkyStrasak Sebastian Garcia sebastian.garcia@agents.fel.cvut.cz @eldracote
More informationLogistic Regression: Probabilistic Interpretation
Logistic Regression: Probabilistic Interpretation Approximate 0/1 Loss Logistic Regression Adaboost (z) SVM Solution: Approximate 0/1 loss with convex loss ( surrogate loss) 0-1 z = y w x SVM (hinge),
More informationDoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action
DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action 1 Table of Content Preamble...3 About Radware s DefensePro... 3 About Radware s Emergency Response
More informationarxiv: v3 [cs.cr] 19 Jul 2016
Toward an Efficient Website Fingerprinting Defense Marc Juarez 1, Mohsen Imani 2, Mike Perry 3, Claudia Diaz 1, and Matthew Wright 2 arxiv:1512.00524v3 [cs.cr] 19 Jul 2016 1 KU Leuven, ESAT/COSIC and iminds,
More informationNetwork Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015
Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, autumn 2015 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor
More informationNetwork Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010
Network Security: Anonymity Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor
More informationCS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD
ERIK JONSSON SCHOOL OF ENGINEERING & COMPUTER SCIENCE Cyber Security Research and Education Institute CS 6324: Information Security Dr. Junia Valente Department of Computer Science The University of Texas
More informationOnion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring
Onion Routing Varun Pandey Dept. of Computer Science, Virginia Tech 1 What is Onion Routing? a distributed overlay network to anonymize TCP based routing Circuit based (clients choose the circuit) Each
More informationShadow: Real Applications, Simulated Networks. Dr. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems
Shadow: Real Applications, Simulated Networks Dr. Rob Jansen Center for High Assurance Computer Systems Cyber Modeling and Simulation Technical Working Group Mark Center, Alexandria, VA October 25 th,
More informationAnonymous communications: Crowds and Tor
Anonymous communications: Crowds and Tor Basic concepts What do we want to hide? sender anonymity attacker cannot determine who the sender of a particular message is receiver anonymity attacker cannot
More informationInternational Journal Of Computer Architecture And Mobility (ISSN ) Volume 1-Issue 3, January Phishing attack Generalization
Phishing attack Generalization Anupam Chandrayan anupam.chandrayan@gmail.com Abstract: Most of the attacks on web application occur by hits and trial methods, analysis of previous methods, misguiding users
More informationSymantec Ransomware Protection
Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway
More informationStatistical based Approach for Packet Classification
Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,
More informationcommunication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.
Introduction to anonymous communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.Leuven) 1 a few words on the scope of the
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationTor: a brief intro. Roger Dingledine The Tor Project
Tor: a brief intro Roger Dingledine The Tor Project https://torproject.org/ 1 What is Tor? Online anonymity 1) software, 2) network, 3) protocol Open source, freely available Community of researchers,
More informationAI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI
SESSION ID: SPO2-T07 AI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI Sridhar Muppidi IBM Fellow and VP Technology IBM Security
More informationAnonymity, Usability, and Humans. Pick Two.
Anonymity, Usability, and Humans. Pick Two. Runa A. Sandvik runa@torproject.org 20 September 2011 Runa A. Sandvik runa@torproject.org () Anonymity, Usability, and Humans. Pick Two. 20 September 2011 1
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010
Network Security: Broadcast and Multicast Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationTor: An Anonymizing Overlay Network for TCP
Tor: An Anonymizing Overlay Network for TCP Roger Dingledine The Free Haven Project http://tor.freehaven.net/ http://tor.eff.org/ December 28, 21C3 2004 Talk Outline Motivation: Why anonymous communication?
More informationNetwork Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012
Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor
More informationRobust Defenses for Cross-Site Request Forgery
Robust Defenses for Cross-Site Request Forgery Tsampanaki Nikoleta Lilitsis Prodromos Gigis Petros Paper Authors: Adam Barth, Collin Jackson, John C. Mitchell Outline What is CSRF attack? What is a login
More information