The FootFall Project - NCSU

38
The FootFall Project “Tracing Attacks Through Non-Cooperative Networks and Stepping Stones with Timing-Based Watermarking” Douglas Reeves Peng Ning Cyber Defense Laboratory N.C. State University IAIC Program Kickoff Meeting November 17, 2003

Transcript of The FootFall Project - NCSU

Page 1: The FootFall Project - NCSU

The FootFall Project“Tracing Attacks Through Non-Cooperative Networks and Stepping Stones with Timing-Based Watermarking”

Douglas Reeves Peng NingCyber Defense LaboratoryN.C. State University

IAIC Program Kickoff MeetingNovember 17, 2003

Page 2: The FootFall Project - NCSU

2

The Name

“FootFall” = sound of a footstep

We propose to record and analyze packet timing (traffic “footsteps”) for tracing purposes

FootFall ≠ FootBall

Page 3: The FootFall Project - NCSU

“Tracing Attacks Through Non-Cooperative Networks and Stepping Stones with Timing-Based Watermarking” Douglas S. Reeves and Peng Ning

FeaturesUses packet timing analysis for attack attributionActively watermarks traffic to assist tracingCan be made arbitrarily robust by increasing the level of redundancyDifficult for attacker to detect; uses random packet selection, delays

ObjectivesIdentify source of attacksOvercome encryption, stepping stones, timing perturbation, other anonymizingtechniquesWork even across non-cooperating networksBe robust against active efforts to evade

Schedule

Basic Idea

Correlation of packet timingacross stepping stones

allows traffic to be traced almost unnoticeably

Technology transfer, acceptance testing and training

*

Investigate solutions to advanced techniques, report

**

Implement solutions to system implementation issues, demo and deliver

*

Create solutions to system implementation issues, report

*

Implement and test solutions to enhanced techniques, deliver and demo

*

Create solutions to enhanced anonymity techniques, report

**

Implement on-line (real-time) kernel-level watermarking method, deliver and demo

*

Implement off-line watermarking method, deliver and demonstrate*

10

987654321

TaskQuarter

Page 4: The FootFall Project - NCSU

4

Website

footfall.csc.ncsu.edu

NEW!

Page 5: The FootFall Project - NCSU

5

overview….

Page 6: The FootFall Project - NCSU

6

Anonymity and Attack Attribution

Attackers have been successful at hiding their identity

greatly increases the likelihood of an attack

Anonymizing techniques can be used…benignly (preserve privacy of the individual)maliciously (conceal identity of terrorists)

Page 7: The FootFall Project - NCSU

7

Anonymizing Techniques

1. IP Address spoofing

2. Disguising of data (steganography)

3. Encryption (packet header and payload)

4. Use of surrogates or intermediaries (proxies, stepping stones, zombies)

5. Mixing with other traffic (camoflaging, mixing)

6. Randomized behavior (onion routing)

Page 8: The FootFall Project - NCSU

8

The Stepping Stone Problem

Victim

Attacker?

Attacker?

Attacker?

Attacker?Attacker!

Stepping Stone

Stepping Stone

Page 9: The FootFall Project - NCSU

9

Correlation of flows

Given an outgoing flow from a stepping stone, correlate it with an incoming flow to the stepping stone

Correlation

Payload

Packet header

Page 10: The FootFall Project - NCSU

10

Novel Ideas / Broad overview

1. Use packet timing for correlation

2. Watermark the timing to facilitate correlation

3. Use redundancy to make robust against attacks

Page 11: The FootFall Project - NCSU

11

technical approach….

Page 12: The FootFall Project - NCSU

12

Timing Based Correlation

Timing based approach works even with…encrypted connectionspadding of the packet payload

But, vulnerable to timing perturbations by the attacker

make unrelated flows look similar (increase false positive rate)make related flows look dissimilar (decrease true positive rate)

Page 13: The FootFall Project - NCSU

13

Limits of Timing Perturbation

Donoho et al. investigated limits of timing perturbation

correlation possible for sufficiently long flows if timing perturbation has pareto distribution

Fundamental questions is correlation effective for flows if timing perturbation has arbitrary distribution?what is the achievable tradeoff among (i) correlation true positive rate(ii) correlation false positive rate (iii) maximum amount of timing perturbation?

Page 14: The FootFall Project - NCSU

14

Correlation using Watermarking

Actively embed a unique watermark into the flow by slightly adjusting the timing of selected packets

Effective correlation is achieved if the embedded watermark is…

unique enough robust enough

Page 15: The FootFall Project - NCSU

15

Embedding A Single-Bit Watermark

(2k+2)sipdw

(2k+1)s (2k+3)s2ksIPD afterwatermarking

w=1w=0

IPD beforewatermarking

(2k+2)s(2k+1)s2ks(2k-1)s

ipd

Page 16: The FootFall Project - NCSU

16

Robustness of the Watermark Bit

-s/2 s/2-D D

Tolerable Perturbation

Range

Vulnerable Perturbation

Range

Vulnerable Perturbation

Range

Tolerable perturbation rangeembedded watermark bit is guaranteed to be recoverable

Vulnerable perturbation rangeembedded watermark bit may not be recoverable

Page 17: The FootFall Project - NCSU

17

Probabilistically Robust Watermarks

If the timing perturbation is outside the tolerable perturbation range, watermarking may fail

How design the watermark so that the probability of this is small?

spread the watermark over a longer duration of the flowembed the watermark bit over the average of m (multiple) IPDs

Page 18: The FootFall Project - NCSU

18

Reducing the Impact of Random Timing Perturbations

-s/2 s/2

Tolerable Perturbance

range

Vulnerable Perturbance

range

Vulnerable Perturbance

range

-D D

m=1

m=4k

m=16k

Effect of the Central Limit Theorem of Statistics

m=k>1

Page 19: The FootFall Project - NCSU

19

Collision and Detection Rates

Making the watermark longer: use L bitsLowers the watermark collision probability

Watermark detection threshold: use hamming distance h

increases the watermark detection rate

Probability Distribution of Expected Detection and Collision with l =24, p=0.9102

0.00

0.10

0.20

0.30

0 5 10 15 20 25Hamming Distance

Prob

abili

ty

Expected Detection

Expected Collision

Page 20: The FootFall Project - NCSU

20

Results for IID Random Perturbations

It is possible to achieve at the same time (!) (i) arbitrarily high watermark detection rate (ii) arbitrarily low watermark collision

with arbitrarily small average timing adjustment

arbitrarily large (but bounded) iid random timing perturbation of

arbitrary distribution

As long as there are enough packets

Page 21: The FootFall Project - NCSU

21

Experiment: True Positive Rate

Conditions24-bit watermarks (i.e., l=24)12 IPDs per bit (i.e., m=12)400ms quantization (i.e., s=400ms)total of 288 packets marked

Using traces of actual traffic from NLANR repository

True Positive Rate Comparsion between IPDCorr and IPCWMCorr with Perturb

0102030405060708090100

0 200 400 600 800 1000 1200 1400

Max Pertub (ms)

True

Pos

itive

(%)

IPDCorr TPIPDWMCorr (FS1) TPIPDWMCorr( FS2) TPExpected IPDWMCorr TP

Rate with watermarking

Rate without watermarking

Page 22: The FootFall Project - NCSU

22

Experiment: False Positive RateFalse Positive (Collision) Rate between

Random Flows and Watermarks

1.E-07

1.E-06

1.E-05

1.E-04

1.E-03

1.E-02

1.E-01

1.E+00

2 3 4 5 6 7 8Hamming Distance Threshold h

Col

lisio

n R

ate

Flow -WM FPWM-Flow FPExpected FP

Same experimental conditions

Measured values very close to predicted values

Page 23: The FootFall Project - NCSU

23

Watermarking Obvious to Attacker?Original 288 Selected IPDs

0

5

10

15

20

25

30

0 50 100 150 200 250 300

IPD Number

Sele

cted

IPD

in s

econ

d

Watermarked 288 Selected IPDs

0

5

10

15

20

25

30

0 50 100 150 200 250 300

IPD NumberW

ater

mar

ked

IPD

in s

econ

d

IPDs BeforeWatermarking

IPDs AfterWatermarking

Page 24: The FootFall Project - NCSU

24

assessment….

Page 25: The FootFall Project - NCSU

25

Previous Work

Correlation based on users’ login activitycaller IDDIDS

Correlation based on packet contents (payload)thumbprintingSWT (Sleepy Watermark Tracing) our work

Correlation based on inter-packet delays (IPDs)on/off baseddeviation basedIPD based our workwavelet based

Page 26: The FootFall Project - NCSU

26

Software Implementation

We have implemented watermarking as an application program

Watermarks recorded traces of network trafficNLANR repository of traffic traces

Calculatesfalse and true positives with watermarkingfalse and true positives without watermarking

Convenient GUI

NEW!

Page 27: The FootFall Project - NCSU

27

Demo of ApplicationNEW!

Page 28: The FootFall Project - NCSU

28

Real-Time Execution

Acquiring and setting up testbed

Evaluated platforms, selected Linux

Experiments measuring timing accuracy

Research into timing system – interrupts, timers, system calls, etc.

In progress: implementing watermarking (and analysis) at the kernel level

NEW!

Page 29: The FootFall Project - NCSU

29

Teaming

All NC State UniversityFaculty (Reeves, Ning)Consultant (Xinyuan Wang)4 Ph.D. studentsNEW!

Page 30: The FootFall Project - NCSU

30

Facilities

Internal testbed

Campus network

Planet Lab

NEW!

NEW!

Page 31: The FootFall Project - NCSU

31

challenges….

Page 32: The FootFall Project - NCSU

32

Harder Problems1. Basic anonymizing techniques

spoofing IP source addressesencryption of packet payloaduse of stepping stones (intermediate hosts)perturbation of packet timing characteristics

2. Enhanced techniquesdropping, retransmitting, or reordering packets in a flowre-packetization of data in a flowtunneling (VPNs, IP within IP, encryption of header and payload)

...

NEW!

Page 33: The FootFall Project - NCSU

33

(cont’d)…

mounting slow, long-timescale attackssplitting one flow into multiple flows, and merging them back together at another point in the network

3. Advanced techniquesaddition of padding traffic (chaff, camouflaging)use of mixers or anonymizing proxiesonion routing

Page 34: The FootFall Project - NCSU

34

High-Risk / High Payoff?The bad news

the attackers have a lot of traffic to hide inthey can exploit sophisticated anonymizingtechniquesonly some network providers will assist with tracing

The good newswe have discovered and demonstrated a powerful, robust traffic watermarking techniquethe technique is lightweight and cheap to implementmany anonymizing techniques make traffic easier to trace

What are the basic limits of traceability?

Page 35: The FootFall Project - NCSU

35

Schedule

Page 36: The FootFall Project - NCSU

36

Technology Transition Plans

Reports and presentations to ARDA, and to intelligence community representatives

Demonstrations and data

Software

Publications

Students

Commercialization? Not unless…

Page 37: The FootFall Project - NCSU

37

Deliverables (Already!)

Website

Presentation at ACM CCS 2003 (2 weeks ago)

Application software with GUI

NEW!

Page 38: The FootFall Project - NCSU

38

Questions or Comments?