+ All Categories
Home > Documents > Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott...

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott...

Date post: 26-Dec-2015
Category:
Upload: claud-higgins
View: 213 times
Download: 0 times
Share this document with a friend
Popular Tags:
26
Defeating Vanish with Low- Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin Owen S. Hofmann Christopher J. Rossbach Brent Waters Emmett Witchel Princeton University Nadia Heninger Edward W. Felten
Transcript
Page 1: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs

The University of Michigan

Scott WolchokJ. Alex Halderman

The University of Texas at Austin

Owen S. HofmannChristopher J. Rossbach

Brent WatersEmmett Witchel

Princeton University

Nadia HeningerEdward W. Felten

Page 2: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

What is a Sybil attack?

Generally target reputation systems The attacker creates a huge number of

pseudonyms Results in attacker controlling a huge

percentage of “entities” aka nodes in the system

Synonymous with “pseudospoofing” “Sybil attack” circa 2002, “pseudospoofing”

pre-2002

Page 3: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Review of the Vuze DHT

Nodes and keys each have a 160-bit Identifier. Each node stores keys which are “closest to it” To join, a node does a lookup for its own ID,

which eventually results in discovering the 20 peers closest to it in the DHT

When an existing node is contacted by a new peer that is within the 20 closest to itself, it identifies the keys which should be owned by that new node and immediately stores those keys to the new node

Nodes are forced to use nodeID = H(IP,Port)

Page 4: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Vanish: Author Assumptions

Sybil Attacks are difficult and expensive to execute against the 1M+ Node Vuze DHT

Page 5: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Vanish: Experimental Results

An experimental private Vuze DHT was used to attempt a Sybil attack

In an 8K node DHT, 600 Sybils were not able to recover even 1 in 1000 experimental VDO’s

In the same 8K node DHT, 710 Sybils were able to recover 25% of nodes with N=150, T=70%

Calculated that 820 Sybils are required to crack 25% of VDO’s with N=50, T=90%

Concluded that ≥87,000 Sybils required to crack 25% VDO’s on the real Vuze DHT

Page 6: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Vanish: Author Conclusion

Calculated that a single “small” Amazon EC2 instance could run 50 Sybils

Calculated that to run 87,000 simultaneous Sybils would cost $860K/year (in 2009)

Page 7: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

What could happen?

If the analysis by the Vanish authors is correct, some people would be well assured they are safe May lead to irresponsible data handling

practices by vanish users

Page 8: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Theoretical Model

Image Credit: “Defeating Vanish”; Wolchok et al. (2010) pp5

Page 9: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

UnVanish: How it works

Uses the native Vuze DHT client with minor modifications

One DHT client joins the Vuze DHT for only 150 seconds

While it is joined, any store request between 16-51 bytes is archived to permanent storage

After 150 seconds, the client is restarted and “hops” to a new UPD port – Therefore obtaining a new Node ID

Page 10: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

UnVanish: What it runs on

10x “small” amazon EC2 instances

Each instance can support 50 concurrent Vuze DHT clients (due to 1.7Gb memory constraint)

Page 11: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

UnVanish: Cost

To recover 92% of key shares, it would cost $23,500 to operate UnVanish continuously for 1 year using Amazon EC2

Page 12: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

ClearView: How It Works

A new (incomplete) Vuze DHT client Written in 2036 lines of C Responds to all PING and STORE commands Responds selectively to FIND-NODE

commands Completely ignores all other DHT protocol

commands A single process manages “many” DHT

clients DHT clients are on the network for 3

minutes between hops

Page 13: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

ClearView: What it runs on

10x “small” Amazon EC2 instances (320K effective Sybils)

A single EC2 instance can host “Thousands” of effective DHT clients

Page 14: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

ClearView: Experiment 1

Tested the N=10 and T=70% “default” FireVanish configuration

320K Effective Sybils

99.4% of shares were found and archived

Page 15: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

ClearView: Experiment 2

Tested N=10, T=70%

270K Effective Sybils

99.5% of shares were found and archived

Page 16: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

ClearView: Experiment 3

Tested N=10, T=70

80K Effective Sybils

91.8% of shares found and archived Similar to the 92% of shares recovered by

UnVanish.

Page 17: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Recovery Model

Image Credit: “Defeating Vanish”; Wolchok et al. (2010) pp8

Page 18: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

ClearView: Cost (2009)

For N=10, T=70% $1950/yr = 25% VDO Recovery $3750/yr = 90% VDO Recovery $5900/yr = 99% VDO Recovery

For N=10, T=90% $3150 /yr = 25% VDO Recovery $7350 /yr = 90% VDO Recovery $11950/yr = 99% VDO Recovery

For N=50, T=90% $4850/yr = 25% VDO Recovery $6900/yr = 90% VDO Recovery $9000/yr = 99% VDO Recovery

Storage Costs are not included, but the authors estimate storage costs would be about $80/year to store 510 GB of data that matches the fingerprint of a “share” for vanish.

Page 19: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

ClearView: Cost

Image Credit: “Defeating Vanish”; Wolchok et al. (2010) pp9

Page 20: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Vanish Cost Analysis Wrong?

#1 Reason:

The Vanish authors assumed that nodes must remain online constantly to carry out the Sybil attack, when actually they only needed about 3 minutes of up time in the 8-hour period.

Page 21: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Vanish Cost Analysis Wrong?

#2 Reason The Vanish authors extrapolated

incorrectly

Image Credit: “Vanish”; Geambasu, Kohno, Levy, Levy (2009) pp14

Page 22: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Vanish Cost Analysis Wrong?

The “Defeating Vanish” Authors show that the difference between 25% of VDO’s vs. 90% of VDO only takes a 53% increase in effective Sybils

This is because they use a probabilistic model instead of extrapolating experimental data

Page 23: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Can Vanish Be Improved?

Raise the threshold Bad Idea – 99/100 shares required would

make VTO’s expire too early Attacker could be more vigilant in scraping the

DHT Switch Vanish to a Private DHT

Node membership is closed – Bad Idea – Fewer maintainers make fewer hands to grease

Would essentially be a trusted 3rd party Solutions already exist that are easier to implement

and faster

Page 24: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Can Vanish Be Improved?

Add Client Puzzles Would certainly raise the cost of Sybil attack

from EC2 Botnets would still easily solve this problem

Restrict Node ID’s Right now, a single IP can have 65535

simultaneous registered nodes. Limiting nodes per IP would increase the

number of IP addresses required to do the Sybil attack

Does not limit botnet attacks

Page 25: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Can Vanish Be Improved?

Detect Attackers Look for nodes that don’t act like other

nodes and penalize them Look for IP addresses with lots of nodes

Peruse – Can scan the entire Vuze network in less than 60 minutes Found that the vast majority of IP addresses host a

single node Identified all of their test systems Identified 10 systems at the University of

Washington used for Vanish demonstrations

Page 26: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.

Can Vanish Be Improved?

Social Networking Require that nodes certify that they

“know” other nodes Social networks have shown people will claim to

know other people when in fact they don’t Could affect viability of DHT – Less participation

with higher entry barrier


Recommended