Dude, where’s that IP? Circumventing measurement-based IP geolocation

38
Dude, where’s that IP? Circumventing measurement-based IP geolocation Paper Presentation CAP6135: Malware and Software Vulnerability Analysis – Spring 2013 Omar Nakhila

description

Dude, where’s that IP? Circumventing measurement-based IP geolocation. Paper Presentation CAP6135: Malware and Software Vulnerability Analysis – Spring 2013 Omar Nakhila. Citation and acknowledgement. - PowerPoint PPT Presentation

Transcript of Dude, where’s that IP? Circumventing measurement-based IP geolocation

Page 1: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Dude, where’s that IP? Circumventing measurement-based IP geolocation

Paper Presentation CAP6135: Malware and Software Vulnerability

Analysis – Spring 2013Omar Nakhila

Page 2: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Citation and acknowledgement

• Gill, Phillipa, Yashar Ganjali, and Bernard Wong. "Dude, Where’s That IP? Circumventing Measurement-based IP Geolocation." USENIX Security Symposium 19th , Washington DC, August 11-13, 2010.

• http://en.wikipedia.org/wiki/Speed_of_electricity

2

Page 3: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Presentation Agenda

• What is IP geolocation?• Why IP geolocation?• IP geolocation classification and

attacks.• Paper contribution.• Paper weakness.• Paper improvement.• Questions and answers.3

Page 4: Dude, where’s that IP? Circumventing measurement-based IP geolocation

What is IP geolocation?• IP geolocation aims to solve the problem of

determining the geographic location of a given IP address.

4

Page 5: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Presentation Agenda

• What is IP geolocation?• Why IP geolocation?• IP geolocation classification and

attacks.• Paper contribution.• Paper weakness.• Paper improvement.• Questions and answers.5

Page 6: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Why IP geolocation?• Online advertisers and search engines

advertise their content based on the client’s location.

6

Page 7: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Why IP geolocation? Cont.• Online content providers such as :– Hulu.– Youtube– etc.limit their content distribution to specific geographic

regions.

7

Page 8: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Why IP geolocation? Cont.• Law enforcement.

9

Page 9: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Presentation Agenda

• What is IP geolocation?• Why IP geolocation?• IP geolocation classification and

attacks.• Paper contribution.• Paper weakness.• Paper improvement.• Questions and answers.10

Page 10: Dude, where’s that IP? Circumventing measurement-based IP geolocation

IP geolocation classification

• Passive IP geolocation.– Ueses geolocation databases such as :• MaxMind.• Quova.

• Active IP geolocation.– Delay-based.• Constraint-Based Geolocation (CBG)

– Topology-aware.• Octant.

– Other.

11

Page 11: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Delay-based IP geolocation

• Constraint-Based Geolocation (CBG)

Landmark A

Landmark B

Landmark C

User IP Location (Target)

PingPing

D_AB=x1

D_AC=x2

Ping

y3

x3

Best Line Function

12

Page 12: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Delay-based IP geolocation

• Constraint-Based Geolocation (CBG)

Landmark A

Landmark B

Landmark C

User IP Location (Target)

x313

Page 13: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Delay-based IP geolocation attack

• Constraint-Based Geolocation (CBG)– Speed of light attack.• Delay time = Distance / Speed• Speed of electricity in an unshielded copper conductor

ranges 95 to 97% that of the speed of light, while in a typical coaxial cable it is about 66% of the speed of light.

– Best line attack.• The attacker has access to the best line function in

landmarks!x3

y3

14

Page 14: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Delay-based IP geolocation attack.

Landmark C Landmark A

Landmark B

User IP Location (Real

Location)

User IP Location (Fake

Location)

Ping

x3

y3

ϴ error

ϵ error

User IP Location (Desired Fake Location)

15

Page 15: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Delay-based IP geolocation attack evaluation

16

Page 16: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Delay-based geolocation attack evaluation

17

Page 17: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Delay-based IP geolocation attack results

SOL Best line function

18

Page 18: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Delay-based IP geolocation attack results

19

Page 19: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Limiting delay-based IP geolocation attack

20

Page 20: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Topology-aware IP geolocation

• Octant

Landmark A

Landmark B

Landmark C

User IP Location (Target)

Using TracertAnd ping

21

Page 21: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Topology-aware IP geolocation

• Octant single gateway

Landmark A

Landmark B

Landmark C

User IP Location (Target)

Using TracertAnd ping

Delay of the last route

22

Page 22: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Topology-aware IP geolocation

• Octant single gateway based attack

Landmark A

Landmark B

Landmark C

User IP Location (Target)

Using TracertAnd ping

23

Page 23: Dude, where’s that IP? Circumventing measurement-based IP geolocation

• Octant multi-gateway based.

Topology-aware IP geolocation

Landmark A

Landmark B

Landmark C

User IP Location (Target)

Using TracertAnd ping

24

Delay of the last route

Delay of the last route

Delay of the last route

Page 24: Dude, where’s that IP? Circumventing measurement-based IP geolocation

• Octant multi-gateway based attack.

Topology-aware IP geolocation attack.

Landmark A

Landmark B

Landmark C

User IP Location (Target)

Using TracertAnd ping

User IP Location (Fake

Location)

25

Page 25: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Topology-aware IP geolocation attack.

• Naming attack, can effect on both single and mutli-gateway topology-aware geolocation.

• The attack based on undns tool.• Each router will have a DNS domain name.• undns tool will map router DNS domain name to a

city. • This naming attack requires the attacker is capable

of crafting a domain name that can deceive the undns tool.

26

Page 26: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Topology-aware IP geolocation

• Octant naming attack.

Landmark A

Landmark B

Landmark C

User IP Location (Target)

Using TracertAnd ping

Domain name belongs to Nevada

Fake Router Location

27

Page 27: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Topology-aware IP geolocation attack simulation.

GatewaysFake Router

Fake location

• 4 gateway routers (Black Colored) • 11 forged locations (T ) ( White Colored) • and 14 non-existent internal routers (F) (Red Colored)• 80 Targets (50 North America and 30 European)

28

Page 28: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Topology-aware geolocation attack results

29

Page 29: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Topology-aware geolocation attack results

30

Page 30: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Presentation Agenda

• What is IP geolocation?• Why IP geolocation?• IP geolocation classification and attacks.• Paper contribution.• Paper weakness.• Paper improvement.• Questions and answers.

31

Page 31: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Paper Contribution• The paper surveyed that the current IP

geolocation algorithms such as (CBG and Octant) accuracies of 35-194 km, making them suitable for geolocation within a country.

• Also, the paper illustrated how the above IP geolocation algorithm can be vulnerable.

• Then, the paper proposed that a delay based attack can be detected by setting a certain threshold to the size of the localization region.

32

Page 32: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Presentation Agenda

• What is IP geolocation?• Why IP geolocation?• IP geolocation classification and attacks.• Paper contribution.• Paper weakness.• Paper improvement.• Questions and answers.

33

Page 33: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Paper Weakness• The paper didn’t explain the complexity of

gaining access to the best line function.• The paper also didn’t explain the complexity to

manipulate undns tool.• Lack of an efficient detection method to catch

undns topology-aware IP geolocation attack.• The scientific reasoning for PlantLab landmarks

distribution with the relation to the IP geolocation was not clear.

• Using ping and trace-route to measure the delay time and route information is not recommended since administrator tend to drop theses types of packets.34

Page 34: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Presentation Agenda

• What is IP geolocation?• Why IP geolocation?• IP geolocation classification and attacks.• Paper contribution.• Paper weakness.• Paper improvement.• Questions and answers.

35

Page 35: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Paper Improvement

• The impact of Landmarks distribution on both attacks.

• Study the effect of using a reliable protocols to limit both attacks.

36

Page 36: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Presentation Agenda

• What is IP geolocation?• Why IP geolocation?• IP geolocation classification and attacks.• Paper contribution.• Paper weakness.• Paper improvement.• Questions and answers.

37

Page 37: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Question and Answer

38

Page 38: Dude, where’s that IP? Circumventing measurement-based IP geolocation

Thank You

39