SlideShare a Scribd company logo
MIST 2012
Panel Discussion: “Key Challenges in
 Defending Against Insider Threats”




                  Ruo Ando
    National Institute of Information and
        Communication Technology
               Tokyo, Japan
Mist2012 panel discussion-ruo ando
Outline: insider threat and data leakage
Information leakage is one of the most serious damages
caused by insider threat. In this talk, I will introduce some
key issues about ex-post countermeasures of information
leakage

①First, "Data lives forever" problem is introduced. Once sensitive
information is leaked over Internet, we have no effective
countermeasures to nullify it. Some topics such as advanced secret
sharing and right to be forgotten will be noted.

②Second, I will talk briefly about "Data sovereignty" to provide a logical
and technical basis for tracking spread information. PDP (provable data
possession) could be one of solutions.

Finally, I will present some actual cases about these problems.
Insider Threats and Information leakage
  LostTape 14%            Incidents by Breach Type
                                                         Stolen document
                                                               14%


                                                      Attacks from outside by hacking
                                                      is motivated for botNet, FaaS etc.

                                                      Data Leakage is one of the main
                                                      purpose of insider attack. Besides,
                                                      this kind of threat causes
                                                      retroactive disclosure.

    Disposal
  Document 14%
                           2012/11 http://www.datalossdb.org

                          Data lives forever:Once sensitive data is released to network,
Social Engineering        it circulates forever.
And APT is sometimes
So hard to be prevented
Technically.              Information leak: retroactive disclosure
                          Sensitive data could retrieved and retroactivated as offense.
Can retroactivation as offense be mitigated ?
  Is ex-post countermeasure possible ?
              Is it unstoppable
              even if we adopt
              domain seizure in
               Amazon EC2 ?
                                                     DLP can protect sensitive
                                                      data sent from SNS ?

    2012/08                         Top threats to enterprise security
Dropbox Confirms                    IDC’s survey
User Email Leaks                                                        2008     2010
– Adds Additional                 Trojans, Virtuses, other malware        54      78
   Protection
                                  Spyware                                 48      74
                                  Hackers                                 41      67
                                  Employees exposing information          52      66
                                  Equipment misconfiguration              41       61
                                  Application Vulnerabilities             44      59
                                  Spam                                    39      58
                                  Data stolen by trusted party            38      53
  Is it possible to prevent
                                  Insider sabotage                        34      49
 Uploading sensitive files ?
Japan’s case: information leakage
           via P2P networks
   2008/03/22
 National Bank of                                              2009/04/02: Tokyo
  Japan leaks
                                                               Rinkai Hospital –
Confidential insider
   information
                                                               a list of 598
                                                               inpatients information


      2005/06
   Documents of
   nuclear power
 plant of Mitsubishi
    was leaked.

                                                    2010/10/30 Metropolitan Police
         2009/01/08: National Information-            Department taking charge of
         Technology Promotion Agency - a             international terrorism splits a
         database of Ministry of Internal Affiars       confidential list over P2P
         and National Patent Office                             networks
Data Sovereignty in Cloud computing era
                                                    A Position Paper on Data
          Data Sovereignty :-                    Sovereignty: The Importance of
                                                  Geolocating Data in the Cloud
the coupling of stored data authenticity          Zachary N. J. Peterson, Mark
 and geographical location in the cloud           Gondree, and Robert Beverly.
                                                     USENIX HotCloud 2011




                               However, as Cloud computing environment has
                               become international, securing data sovereignty
                               is harder and harder.



                                                    Giuseppe Ateniese, Randal C.
 Technology of geolocation could be                 Burns, Reza Curtmola, Joseph
                                                    Herring, Lea Kissner, Zachary
 cheated. PDP (Provable Data Possession)                 N. J. Peterson, Dawn
 could be one of the solutions                      Xiaodong Song: Provable data
 for this problem.                                     possession at untrusted
                                                        stores. ACM CCS 2007
"Data lives forever" problem
• Wiki Leaks
WikiLeaks is an international organization that publishes submissions of
otherwise unavailable documents from anonymous sources and leaks.
On July 25, 2010, WikiLeaks released to The Guardian, The New York
Times, and Der Spiegel over 92,000 documentsrelated to the war in
Afghanistan between 2004 and the end of 2009.

• “Right to forget and delete”
European Commission sets out strategy to strengthen EU data protection
rules Nov 2010. “Controlling your information, having access to your data,
being able to modify or delete it – these are essential rights that have to be
guaranteed in today's digital world. “
P2P security
                        VANISH: self destructing data

Roxana Geambasu, Tadayoshi Kohno, Amit Levy, Henry M. Levy. Vanish:
Increasing Data Privacy with Self-Destructing Data. In Proceedings of the
USENIX Security Symposium, Montreal, Canada, August 2009.
Technology: Secret sharing protocol and DHT

In vanish system, shared file is disappeared from network in a fixed interval.
Bob sends {C,L} to Alice. VANISH is implemented for Vuse DHT.



                                    {C,L}
    Data, timeout                                            Data, timeout
                                     KN



 RANDOM INDEXES (L)                           K2           RANDOM INDEXES (L)

                               K1
  C=Ek(data)                                                 data=Dk(C)
P2P security
                      UNVANISH: reconstructing data

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J.
Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett
Witchel, Network and IT Security Conference: NDSS 2010

UNVANISH mounts sybil nodes into DHT to replicate Ek hash to
reconstruct data.


                         {C,L}
                                        UNVANISH

   Data, timeout                                       Data, timeout
                                  KN



 RANDOM INDEXES (L)                         K2        RANDOM INDEXES (L)

                            K1
  C=Ek(data)                                            data=Dk(C)
Example:
  Propagation speed
  over DHT network

                                                                                                                 d if f
                                                   1 000000




                                                    1 00000




                                                     1 0000
                                                              0   1   2   3   4   5   6   7   8   9   10   11   12        13   14   15   16   17   18   19   20   21   22   23   24   25   26




                                                                                                                nod e
                                                  12000000


                                                  10000000


                                                   8000000


                                                   6000000


                                                   4000000


                                                   2000000


Bit Torrent traffic rate of all internet                  0
                                                              0   1   2   3   4   5   6   7   8   9   10   11   12        13   14   15   16   17   18   19   20   21   22   23   24   25   26

estimates
① “55%” - CableLabs
About an half of upstream traffic of CATV.

② “35%” - CacheLogic
“LIVEWIRE - File-sharing network thrives
                                                                                                   After 5 hours,
beneath the Radar”                                                                            Δ ( increasing) become
③ “60%” - documents in www.sans.edu
                                                                                                       stable
                                              In first 4 hours, we can
“It is estimated that more than 60%
of the traffic on                                       obtain
the internet is peer-to-peer.”               more than 4000000 peers!

More Related Content

PDF
the darknet and the future of content distribution
mustafa sarac
 
DOC
Pptx present
Nitish Bhardwaj
 
DOC
Darknet5
swathi4crazy
 
PPTX
Stefan Decker
dri_ireland
 
PPT
Stefan Decker Keynote at CSHALS
Stefan Decker
 
PDF
Ijetr011937
ER Publication.org
 
PDF
Security, Privacy and the Future Internet
Fraunhofer Institute for Secure Information Technology
 
PDF
Copyrightcontraband
Eddan Katz
 
the darknet and the future of content distribution
mustafa sarac
 
Pptx present
Nitish Bhardwaj
 
Darknet5
swathi4crazy
 
Stefan Decker
dri_ireland
 
Stefan Decker Keynote at CSHALS
Stefan Decker
 
Ijetr011937
ER Publication.org
 
Security, Privacy and the Future Internet
Fraunhofer Institute for Secure Information Technology
 
Copyrightcontraband
Eddan Katz
 

What's hot (19)

PDF
Copyrightcontraband cepe2007
Eddan Katz
 
PDF
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
Mark Hyde
 
PDF
OMG DDS Tutorial - Part I
Angelo Corsaro
 
PDF
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
IRJET Journal
 
PDF
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
PDF
International Journal of Wireless & Mobile Networks (IJWMN)
ijwmn
 
PDF
Interplay of Digital Forensics in eDiscovery
CSCJournals
 
PDF
Ijeee 16-19-digital media hidden data extracting
Kumar Goud
 
PPTX
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
i_scienceEU
 
PDF
The Impact on Security due to the Vulnerabilities Existing in the network a S...
IJAEMSJORNAL
 
PDF
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
iosrjce
 
PDF
O046048187
IJERA Editor
 
PDF
Twenty Years of Metadata: Lessons from the First Two Decades of the Web
Stuart Weibel
 
PDF
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
PDF
The Data Distribution Service
Angelo Corsaro
 
PDF
DDS in Action -- Part I
Angelo Corsaro
 
PDF
Ej24856861
IJERA Editor
 
PDF
Privacy preserving detection of sensitive data exposure
Pvrtechnologies Nellore
 
Copyrightcontraband cepe2007
Eddan Katz
 
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
Mark Hyde
 
OMG DDS Tutorial - Part I
Angelo Corsaro
 
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
IRJET Journal
 
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
International Journal of Wireless & Mobile Networks (IJWMN)
ijwmn
 
Interplay of Digital Forensics in eDiscovery
CSCJournals
 
Ijeee 16-19-digital media hidden data extracting
Kumar Goud
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
i_scienceEU
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
IJAEMSJORNAL
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
iosrjce
 
O046048187
IJERA Editor
 
Twenty Years of Metadata: Lessons from the First Two Decades of the Web
Stuart Weibel
 
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
The Data Distribution Service
Angelo Corsaro
 
DDS in Action -- Part I
Angelo Corsaro
 
Ej24856861
IJERA Editor
 
Privacy preserving detection of sensitive data exposure
Pvrtechnologies Nellore
 
Ad

Similar to Mist2012 panel discussion-ruo ando (20)

PDF
Top Security Trends for 2013
Imperva
 
PDF
Trustwave 2012 Global Güvenlik Raporu
Erol Dizdar
 
PPTX
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf Mattsson
 
PPT
Security Intelligence: Advanced Persistent Threats
Peter Wood
 
PPTX
Big data security the perfect storm
Ulf Mattsson
 
PDF
Homeland Security - strengthening the weakest link
Flaskdata.io
 
PDF
RSA 2010 Kevin Rowney
Symantec
 
PDF
Why My E Identity Needs Protection
ecarrow
 
PDF
Data trawling and security strategies
Venkata Karthik Gullapalli
 
PPTX
Mis05
Lee Gomez
 
PPTX
Tokenization on the Node - Data Protection for Security and Compliance
Ulf Mattsson
 
PPTX
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Ulf Mattsson
 
PPTX
COMPUTER APPLICATIONS Module 4.pptx
Arti Parab Academics
 
PPTX
Isaca e symposium understanding your data flow jul 6
Ulf Mattsson
 
PPTX
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
PPT
Threats
sbmiller87
 
PPTX
Risk Management Practices for PCI DSS 2.0
Ulf Mattsson
 
PDF
2012 Data Breach Investigations Report
Verizon Thought Leadership
 
PDF
Choosing the Right Data Security Solution
Protegrity
 
Top Security Trends for 2013
Imperva
 
Trustwave 2012 Global Güvenlik Raporu
Erol Dizdar
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf Mattsson
 
Security Intelligence: Advanced Persistent Threats
Peter Wood
 
Big data security the perfect storm
Ulf Mattsson
 
Homeland Security - strengthening the weakest link
Flaskdata.io
 
RSA 2010 Kevin Rowney
Symantec
 
Why My E Identity Needs Protection
ecarrow
 
Data trawling and security strategies
Venkata Karthik Gullapalli
 
Mis05
Lee Gomez
 
Tokenization on the Node - Data Protection for Security and Compliance
Ulf Mattsson
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Ulf Mattsson
 
COMPUTER APPLICATIONS Module 4.pptx
Arti Parab Academics
 
Isaca e symposium understanding your data flow jul 6
Ulf Mattsson
 
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
Threats
sbmiller87
 
Risk Management Practices for PCI DSS 2.0
Ulf Mattsson
 
2012 Data Breach Investigations Report
Verizon Thought Leadership
 
Choosing the Right Data Security Solution
Protegrity
 
Ad

More from Ruo Ando (20)

PDF
KISTI-NII Joint Security Workshop 2023.pdf
Ruo Ando
 
PDF
Gartner 「セキュリティ&リスクマネジメントサミット 2019」- 安藤
Ruo Ando
 
PDF
解説#86 決定木 - ss.pdf
Ruo Ando
 
PDF
SaaSアカデミー for バックオフィス アイドルと学ぶDX講座 ~アイドル戦略に見るDXを専門家が徹底解説~
Ruo Ando
 
PDF
解説#83 情報エントロピー
Ruo Ando
 
PDF
解説#82 記号論理学
Ruo Ando
 
PDF
解説#81 ロジスティック回帰
Ruo Ando
 
PDF
解説#74 連結リスト
Ruo Ando
 
PDF
解説#76 福岡正信
Ruo Ando
 
PDF
解説#77 非加算無限
Ruo Ando
 
PDF
解説#1 C言語ポインタとアドレス
Ruo Ando
 
PDF
解説#78 誤差逆伝播
Ruo Ando
 
PDF
解説#73 ハフマン符号
Ruo Ando
 
PDF
【技術解説20】 ミニバッチ確率的勾配降下法
Ruo Ando
 
PDF
【技術解説4】assertion failureとuse after-free
Ruo Ando
 
PDF
ITmedia Security Week 2021 講演資料
Ruo Ando
 
PPTX
ファジングの解説
Ruo Ando
 
PDF
AI(機械学習・深層学習)との協働スキルとOperational AIの事例紹介 @ ビジネス+ITセミナー 2020年11月
Ruo Ando
 
PDF
【AI実装4】TensorFlowのプログラムを読む2 非線形回帰
Ruo Ando
 
PDF
Intel Trusted Computing Group 1st Workshop
Ruo Ando
 
KISTI-NII Joint Security Workshop 2023.pdf
Ruo Ando
 
Gartner 「セキュリティ&リスクマネジメントサミット 2019」- 安藤
Ruo Ando
 
解説#86 決定木 - ss.pdf
Ruo Ando
 
SaaSアカデミー for バックオフィス アイドルと学ぶDX講座 ~アイドル戦略に見るDXを専門家が徹底解説~
Ruo Ando
 
解説#83 情報エントロピー
Ruo Ando
 
解説#82 記号論理学
Ruo Ando
 
解説#81 ロジスティック回帰
Ruo Ando
 
解説#74 連結リスト
Ruo Ando
 
解説#76 福岡正信
Ruo Ando
 
解説#77 非加算無限
Ruo Ando
 
解説#1 C言語ポインタとアドレス
Ruo Ando
 
解説#78 誤差逆伝播
Ruo Ando
 
解説#73 ハフマン符号
Ruo Ando
 
【技術解説20】 ミニバッチ確率的勾配降下法
Ruo Ando
 
【技術解説4】assertion failureとuse after-free
Ruo Ando
 
ITmedia Security Week 2021 講演資料
Ruo Ando
 
ファジングの解説
Ruo Ando
 
AI(機械学習・深層学習)との協働スキルとOperational AIの事例紹介 @ ビジネス+ITセミナー 2020年11月
Ruo Ando
 
【AI実装4】TensorFlowのプログラムを読む2 非線形回帰
Ruo Ando
 
Intel Trusted Computing Group 1st Workshop
Ruo Ando
 

Recently uploaded (20)

PDF
PowerPoint Presentation -- Larry G -- 2021 -- 218df4ebe0bc5607d6bfcf49fd21eda...
Adeel452922
 
PPT
HUUHAA.ppt NHVGDGVBXCDGFBVGCCDJBVGDGHHVXHGVCXX
ssuser0b1c0e
 
PDF
Invincible season 2 storyboard revisions seq3 by Mark G
MarkGalez
 
PDF
Invincible Season 2 Storyboard Revisions by Mark G
MarkGalez
 
PDF
Left Holding the Bag sequence 3 Storyboard by Mark G.
MarkGalez
 
PDF
Invincible season 2 storyboard revisions seq2 by Mark G
MarkGalez
 
PPTX
FSS seminar-cours-work the future of material surfaces.pptx
sanjaychief112
 
PPTX
How To Write A ResumeCV - Resume Writing Tips
yeasinArafath6
 
PPTX
PRESENTATION OF SEPSIS, SEPTIC SHOCK.pptx
ericklouiseopio
 
PPTX
Title The Power of Oral Communication (2).pptx
amankumar7762044
 
PPTX
Capstone Professional Portfolio Melissa Alice
malice926
 
PDF
Professor Dr. Nazrul Islam - Curriculum Vitae.pdf
Dr. Nazrul Islam
 
PPTX
PPT Lapkas helminthiasiiiiiiiiiiiiis.pptx
ratnaernawati4
 
PPTX
tech vs soft skill .pptxhgdvnhygnuufcbnbg
spnr2427
 
PDF
LeadIAS – Best IAS Coaching in Kerala.pdf
LeadIAS
 
PPTX
MARIMUTHU .pptxwthvdtsdghggggyhyyyxghhce
sakthick46
 
PPTX
Jaipur Sees Exponential Growth in Data Analytics Jobs Salarite Smart Hiring P...
vinay salarite
 
PPTX
Presentation.pptxjjjnjnnnnnnnnnnnnnnnnnnnn
simajameel01
 
PDF
Left Holding the Bag sequence 1 storyboard by Mark G.
MarkGalez
 
PPTX
introduction to python in detail including .pptx
urvashipundir04
 
PowerPoint Presentation -- Larry G -- 2021 -- 218df4ebe0bc5607d6bfcf49fd21eda...
Adeel452922
 
HUUHAA.ppt NHVGDGVBXCDGFBVGCCDJBVGDGHHVXHGVCXX
ssuser0b1c0e
 
Invincible season 2 storyboard revisions seq3 by Mark G
MarkGalez
 
Invincible Season 2 Storyboard Revisions by Mark G
MarkGalez
 
Left Holding the Bag sequence 3 Storyboard by Mark G.
MarkGalez
 
Invincible season 2 storyboard revisions seq2 by Mark G
MarkGalez
 
FSS seminar-cours-work the future of material surfaces.pptx
sanjaychief112
 
How To Write A ResumeCV - Resume Writing Tips
yeasinArafath6
 
PRESENTATION OF SEPSIS, SEPTIC SHOCK.pptx
ericklouiseopio
 
Title The Power of Oral Communication (2).pptx
amankumar7762044
 
Capstone Professional Portfolio Melissa Alice
malice926
 
Professor Dr. Nazrul Islam - Curriculum Vitae.pdf
Dr. Nazrul Islam
 
PPT Lapkas helminthiasiiiiiiiiiiiiis.pptx
ratnaernawati4
 
tech vs soft skill .pptxhgdvnhygnuufcbnbg
spnr2427
 
LeadIAS – Best IAS Coaching in Kerala.pdf
LeadIAS
 
MARIMUTHU .pptxwthvdtsdghggggyhyyyxghhce
sakthick46
 
Jaipur Sees Exponential Growth in Data Analytics Jobs Salarite Smart Hiring P...
vinay salarite
 
Presentation.pptxjjjnjnnnnnnnnnnnnnnnnnnnn
simajameel01
 
Left Holding the Bag sequence 1 storyboard by Mark G.
MarkGalez
 
introduction to python in detail including .pptx
urvashipundir04
 

Mist2012 panel discussion-ruo ando

  • 1. MIST 2012 Panel Discussion: “Key Challenges in Defending Against Insider Threats” Ruo Ando National Institute of Information and Communication Technology Tokyo, Japan
  • 3. Outline: insider threat and data leakage Information leakage is one of the most serious damages caused by insider threat. In this talk, I will introduce some key issues about ex-post countermeasures of information leakage ①First, "Data lives forever" problem is introduced. Once sensitive information is leaked over Internet, we have no effective countermeasures to nullify it. Some topics such as advanced secret sharing and right to be forgotten will be noted. ②Second, I will talk briefly about "Data sovereignty" to provide a logical and technical basis for tracking spread information. PDP (provable data possession) could be one of solutions. Finally, I will present some actual cases about these problems.
  • 4. Insider Threats and Information leakage LostTape 14% Incidents by Breach Type Stolen document 14% Attacks from outside by hacking is motivated for botNet, FaaS etc. Data Leakage is one of the main purpose of insider attack. Besides, this kind of threat causes retroactive disclosure. Disposal Document 14% 2012/11 http://www.datalossdb.org Data lives forever:Once sensitive data is released to network, Social Engineering it circulates forever. And APT is sometimes So hard to be prevented Technically. Information leak: retroactive disclosure Sensitive data could retrieved and retroactivated as offense.
  • 5. Can retroactivation as offense be mitigated ? Is ex-post countermeasure possible ? Is it unstoppable even if we adopt domain seizure in Amazon EC2 ? DLP can protect sensitive data sent from SNS ? 2012/08 Top threats to enterprise security Dropbox Confirms IDC’s survey User Email Leaks   2008 2010 – Adds Additional Trojans, Virtuses, other malware 54 78 Protection Spyware 48 74 Hackers 41 67 Employees exposing information 52 66 Equipment misconfiguration 41 61 Application Vulnerabilities 44 59 Spam 39 58 Data stolen by trusted party 38 53 Is it possible to prevent Insider sabotage 34 49 Uploading sensitive files ?
  • 6. Japan’s case: information leakage via P2P networks 2008/03/22 National Bank of 2009/04/02: Tokyo Japan leaks Rinkai Hospital – Confidential insider information a list of 598 inpatients information 2005/06 Documents of nuclear power plant of Mitsubishi was leaked. 2010/10/30 Metropolitan Police 2009/01/08: National Information- Department taking charge of Technology Promotion Agency - a international terrorism splits a database of Ministry of Internal Affiars confidential list over P2P and National Patent Office networks
  • 7. Data Sovereignty in Cloud computing era A Position Paper on Data Data Sovereignty :- Sovereignty: The Importance of Geolocating Data in the Cloud the coupling of stored data authenticity Zachary N. J. Peterson, Mark and geographical location in the cloud Gondree, and Robert Beverly. USENIX HotCloud 2011 However, as Cloud computing environment has become international, securing data sovereignty is harder and harder. Giuseppe Ateniese, Randal C. Technology of geolocation could be Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary cheated. PDP (Provable Data Possession) N. J. Peterson, Dawn could be one of the solutions Xiaodong Song: Provable data for this problem. possession at untrusted stores. ACM CCS 2007
  • 8. "Data lives forever" problem • Wiki Leaks WikiLeaks is an international organization that publishes submissions of otherwise unavailable documents from anonymous sources and leaks. On July 25, 2010, WikiLeaks released to The Guardian, The New York Times, and Der Spiegel over 92,000 documentsrelated to the war in Afghanistan between 2004 and the end of 2009. • “Right to forget and delete” European Commission sets out strategy to strengthen EU data protection rules Nov 2010. “Controlling your information, having access to your data, being able to modify or delete it – these are essential rights that have to be guaranteed in today's digital world. “
  • 9. P2P security VANISH: self destructing data Roxana Geambasu, Tadayoshi Kohno, Amit Levy, Henry M. Levy. Vanish: Increasing Data Privacy with Self-Destructing Data. In Proceedings of the USENIX Security Symposium, Montreal, Canada, August 2009. Technology: Secret sharing protocol and DHT In vanish system, shared file is disappeared from network in a fixed interval. Bob sends {C,L} to Alice. VANISH is implemented for Vuse DHT. {C,L} Data, timeout Data, timeout KN RANDOM INDEXES (L) K2 RANDOM INDEXES (L) K1 C=Ek(data) data=Dk(C)
  • 10. P2P security UNVANISH: reconstructing data Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel, Network and IT Security Conference: NDSS 2010 UNVANISH mounts sybil nodes into DHT to replicate Ek hash to reconstruct data. {C,L} UNVANISH Data, timeout Data, timeout KN RANDOM INDEXES (L) K2 RANDOM INDEXES (L) K1 C=Ek(data) data=Dk(C)
  • 11. Example: Propagation speed over DHT network d if f 1 000000 1 00000 1 0000 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 nod e 12000000 10000000 8000000 6000000 4000000 2000000 Bit Torrent traffic rate of all internet 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 estimates ① “55%” - CableLabs About an half of upstream traffic of CATV. ② “35%” - CacheLogic “LIVEWIRE - File-sharing network thrives After 5 hours, beneath the Radar” Δ ( increasing) become ③ “60%” - documents in www.sans.edu stable In first 4 hours, we can “It is estimated that more than 60% of the traffic on obtain the internet is peer-to-peer.” more than 4000000 peers!