Ostra: Leveraging trust to thwart unwanted communication Alan - - PowerPoint PPT Presentation

ostra leveraging trust to thwart unwanted communication
SMART_READER_LITE
LIVE PREVIEW

Ostra: Leveraging trust to thwart unwanted communication Alan - - PowerPoint PPT Presentation

Ostra: Leveraging trust to thwart unwanted communication Alan Mislove Ansley Post Peter Druschel Krishna Gummadi MPI-SWS Rice University NSDI 2008 Digital communication Electronic systems provide low-cost


slide-1
SLIDE 1

Ostra: Leveraging trust to thwart unwanted communication

Alan Mislove†‡ Ansley Post†‡ Peter Druschel† Krishna Gummadi†

†MPI-SWS

‡Rice University

NSDI 2008

slide-2
SLIDE 2

16.04.2008 NSDI’08 Alan Mislove

Digital communication

Electronic systems provide low-cost communication

Email VoIP Blogs IM Content-sharing

Democratized content publication

Can make content available to (millions of) users

2

slide-3
SLIDE 3

16.04.2008 NSDI’08 Alan Mislove

Unwanted communication

Low cost abused to send unwanted communication

Spam Unwanted Skype invitations

Affecting content-sharing sites

Mislabeled content on YouTube

Users are not accountable

Banned users can create new identity

3

slide-4
SLIDE 4

Filter based on content

Hard for rich media (videos, photos)

16.04.2008 NSDI’08 Alan Mislove

Previous approaches

4

VIAGRA

slide-5
SLIDE 5

Filter based on content

Hard for rich media (videos, photos)

16.04.2008 NSDI’08 Alan Mislove

Previous approaches

4

Charge money to send

Requires micropayment infrastructure

VIAGRA

slide-6
SLIDE 6

Filter based on content

Hard for rich media (videos, photos)

16.04.2008 NSDI’08 Alan Mislove

Previous approaches

4

Charge money to send

Requires micropayment infrastructure

Introduce strong identities

Resisted by users

VIAGRA

slide-7
SLIDE 7

16.04.2008 NSDI’08 Alan Mislove

Ostra

New approach to preventing unwanted communication

Leverages an (existing) social network

Works in conjunction with existing communication system

No content filtering No additional monetary cost No strong identities

Key idea: Exploit cost of maintaining social relationships

Inspired by trust in offline world

5

slide-8
SLIDE 8

16.04.2008 NSDI’08 Alan Mislove

Outline

Inspiration: Hawala Ostra in detail Evaluation Related work Conclusion

6

slide-9
SLIDE 9

Inspiration: Hawala

slide-10
SLIDE 10

System for transferring money

Originated in India, centuries old

Give money to a hawala dealer

Often someone you know already Transfered via hawala dealer social network

Hawala dealers only exchange notes

Settle up in the future

Comparable to debt between banks

But trust is only pairwise

16.04.2008 NSDI’08 Alan Mislove

Hawala

8

India

$

slide-11
SLIDE 11

System for transferring money

Originated in India, centuries old

Give money to a hawala dealer

Often someone you know already Transfered via hawala dealer social network

Hawala dealers only exchange notes

Settle up in the future

Comparable to debt between banks

But trust is only pairwise

16.04.2008 NSDI’08 Alan Mislove

Hawala

8

Hawala dealers

India

$

slide-12
SLIDE 12

System for transferring money

Originated in India, centuries old

Give money to a hawala dealer

Often someone you know already Transfered via hawala dealer social network

Hawala dealers only exchange notes

Settle up in the future

Comparable to debt between banks

But trust is only pairwise

16.04.2008 NSDI’08 Alan Mislove

Hawala

8

Hawala dealers

India

$

slide-13
SLIDE 13

System for transferring money

Originated in India, centuries old

Give money to a hawala dealer

Often someone you know already Transfered via hawala dealer social network

Hawala dealers only exchange notes

Settle up in the future

Comparable to debt between banks

But trust is only pairwise

16.04.2008 NSDI’08 Alan Mislove

Hawala

8

Hawala dealers

India

$

slide-14
SLIDE 14

16.04.2008 NSDI’08 Alan Mislove

Why does hawala work?

9

slide-15
SLIDE 15

16.04.2008 NSDI’08 Alan Mislove

Why does hawala work?

Links take effort to form/maintain

Can’t get new links easily

9

slide-16
SLIDE 16

16.04.2008 NSDI’08 Alan Mislove

Why does hawala work?

Links take effort to form/maintain

Can’t get new links easily

Misbehavior results in being ostracized

Short-term gain vs. long-term loss

9

slide-17
SLIDE 17

16.04.2008 NSDI’08 Alan Mislove

Why does hawala work?

Links take effort to form/maintain

Can’t get new links easily

Misbehavior results in being ostracized

Short-term gain vs. long-term loss

Result: Social network used to transfer money

9

slide-18
SLIDE 18

Ostra

slide-19
SLIDE 19

16.04.2008 NSDI’08 Alan Mislove

Ostra

Uses social network to prevent unwanted communication

Same mechanism as hawala

Ostra does not need a high level of trust

Cost of failure in hawala is high → high level of trust needed Far less at stake in Ostra

Can be applied to

Messaging (email, IM, VoIP) Group communication (mailing lists) Content sharing (YouTube, Flickr)

11

slide-20
SLIDE 20

16.04.2008 NSDI’08 Alan Mislove

Ostra’s social network

Most communication systems embed social network

Email contacts IM buddies Social network friends

Can be explicit or implicit Assumptions

Links take some effort to form and maintain Trusted site maintains social network

12

slide-21
SLIDE 21

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-22
SLIDE 22

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-23
SLIDE 23

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Destination Source

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-24
SLIDE 24

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Destination Source

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-25
SLIDE 25

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Destination Source

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-26
SLIDE 26

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

x

Destination Source

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-27
SLIDE 27

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source Destination

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-28
SLIDE 28

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source Destination

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-29
SLIDE 29

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source Destination

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-30
SLIDE 30

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source Destination

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-31
SLIDE 31

16.04.2008 NSDI’08 Alan Mislove

High-level overview

13

Source Destination

x

Recipients classify messages

Can be implicit (e.g., deleting or responding to a message)

Messages are sent directly

slide-32
SLIDE 32

16.04.2008 NSDI’08 Alan Mislove

Link accounting

14

B

slide-33
SLIDE 33

16.04.2008 NSDI’08 Alan Mislove

Link accounting

Each link has a credit balance B

How much one user is “in debt” with the other

14

B

slide-34
SLIDE 34

16.04.2008 NSDI’08 Alan Mislove

Link accounting

Each link has a credit balance B

How much one user is “in debt” with the other

Link also has credit bounds [L,U]

Maximal debt each user is willing to accept (L ≤ B ≤ U)

14

B L U

slide-35
SLIDE 35
  • 5

+5

16.04.2008 NSDI’08 Alan Mislove

Link accounting

Each link has a credit balance B

How much one user is “in debt” with the other

Link also has credit bounds [L,U]

Maximal debt each user is willing to accept (L ≤ B ≤ U)

14

  • 1
slide-36
SLIDE 36

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjusted

Reset once message classified If adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

slide-37
SLIDE 37

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjusted

Reset once message classified If adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

slide-38
SLIDE 38

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjusted

Reset once message classified If adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

slide-39
SLIDE 39

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjusted

Reset once message classified If adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

slide-40
SLIDE 40

16.04.2008 NSDI’08 Alan Mislove

Sending a message

15

When message is sent, lower bound is temporarily adjusted

Reset once message classified If adjustment cannot be made, message is delayed

If recipient marks message unwanted, balance is adjusted

slide-41
SLIDE 41

16.04.2008 NSDI’08 Alan Mislove

Sending to non-friends

16

Process iterates for sending to non-friends

Find any path from source to destination

Intermediate users indifferent to outcome

In either case, total credit is the same

slide-42
SLIDE 42

16.04.2008 NSDI’08 Alan Mislove

Sending to non-friends

16

Process iterates for sending to non-friends

Find any path from source to destination

Intermediate users indifferent to outcome

In either case, total credit is the same

slide-43
SLIDE 43

16.04.2008 NSDI’08 Alan Mislove

Sending to non-friends

16

Process iterates for sending to non-friends

Find any path from source to destination

Intermediate users indifferent to outcome

In either case, total credit is the same

slide-44
SLIDE 44

S

16.04.2008 NSDI’08 Alan Mislove

Guarantees

17

Received spam

What is the per-user bound on sending spam?

slide-45
SLIDE 45

S

16.04.2008 NSDI’08 Alan Mislove

Guarantees

17

Received spam

What is the per-user bound on sending spam?

Lower bound

|L| +

slide-46
SLIDE 46

S

16.04.2008 NSDI’08 Alan Mislove

Guarantees

17

Received spam

What is the per-user bound on sending spam?

N ∗

Number of links Lower bound

|L| +

slide-47
SLIDE 47

16.04.2008 NSDI’08 Alan Mislove

Guarantees for groups

Analysis is same for any subgraph

Conservation of credit: Credit can neither be created nor destroyed

Result: Collusion doesn’t help attackers

18

N ∗ |L| + S

slide-48
SLIDE 48

16.04.2008 NSDI’08 Alan Mislove

Guarantees for groups

Analysis is same for any subgraph

Conservation of credit: Credit can neither be created nor destroyed

Result: Collusion doesn’t help attackers

18

N

N ∗ |L| + S

slide-49
SLIDE 49

16.04.2008 NSDI’08 Alan Mislove

Adjustments

An average user will occasionally

Receive an unwanted message (receive credit) Send mail marked as unwanted (lose credit)

May cause user’s balance to hit bounds

If (B = L), cannot send If (B = U), cannot receive

Introduce credit decay d

Outstanding balance (+ or −) decays (e.g., d=10% per day)

Preserves conservation of credit

19

slide-50
SLIDE 50

16.04.2008 NSDI’08 Alan Mislove

Adjustments (cont.)

Offline users may cause credit reservation

Bounds adjusted until message classified

Introduce classification timeout T

Message treated as “wanted” if unclassified after T

Also offers plausible deniability of receipt

20

slide-51
SLIDE 51

16.04.2008 NSDI’08 Alan Mislove

Applying Ostra to content-sharing

Create “virtual” identity for content-sharing site

Uploads are message to this identity

Site uses existing mechanisms to determine if unwanted

21

slide-52
SLIDE 52

16.04.2008 NSDI’08 Alan Mislove

Ostra security

Can conspiring users “create” credit? Could Ostra reach starvation? What about users with multiple identities? Can attackers disconnect the network?

22

slide-53
SLIDE 53

16.04.2008 NSDI’08 Alan Mislove

Ostra security

Can conspiring users “create” credit? Could Ostra reach starvation? What about users with multiple identities? Can attackers disconnect the network?

22

}

In paper

slide-54
SLIDE 54

16.04.2008 NSDI’08 Alan Mislove

What about multiple identities?

23

slide-55
SLIDE 55

16.04.2008 NSDI’08 Alan Mislove

What about multiple identities?

23

{

Multiple Identities

slide-56
SLIDE 56

16.04.2008 NSDI’08 Alan Mislove

What about multiple identities?

23

{

Multiple Identities

slide-57
SLIDE 57

16.04.2008 NSDI’08 Alan Mislove

What about multiple identities?

23

{

Multiple Identities

slide-58
SLIDE 58

16.04.2008 NSDI’08 Alan Mislove

Can attackers target vital links?

Social networks tend to have dense core [IMC’07]

Min-cut is almost always at source or destination (see paper)

24

slide-59
SLIDE 59

16.04.2008 NSDI’08 Alan Mislove

Can attackers target vital links?

Social networks tend to have dense core [IMC’07]

Min-cut is almost always at source or destination (see paper)

24

slide-60
SLIDE 60

16.04.2008 NSDI’08 Alan Mislove

Evaluation

Is Ostra effective in blocking unwanted communication? Does Ostra delay message delivery? What is the complexity of finding paths? How do parameter settings affect performance? Does incorrect message classification break Ostra? Are there vulnerable links in social networks?

25

slide-61
SLIDE 61

16.04.2008 NSDI’08 Alan Mislove

Evaluation

Is Ostra effective in blocking unwanted communication? Does Ostra delay message delivery? What is the complexity of finding paths? How do parameter settings affect performance? Does incorrect message classification break Ostra? Are there vulnerable links in social networks?

25

}

In paper

slide-62
SLIDE 62

16.04.2008 NSDI’08 Alan Mislove

Simulating Ostra

Need a social network and a message trace

Social network trace from YouTube (446K users, 1.7M links) Email trace from MPI (150 users for 3 months, 13K messages)

Simulated Ostra in three scenarios

Messaging with random traffic Messaging with proximity-biased traffic Centralized content-sharing site

Simulation parameters

Selected random attacking users Bounds of [-3,3] and d=10% per day

26

slide-63
SLIDE 63

16.04.2008 NSDI’08 Alan Mislove

Does Ostra block spammers?

Ostra limits amount of unwanted communication

Even with 20% attackers, only 4 messages/good user/week

27

0.1 0.01 0.001 0.0001 1 0.1 0.01 0.001 Unwanted messages received (messages/user/week) Proportion of attackers (%) Expected Random Proximity YouTube

slide-64
SLIDE 64

16.04.2008 NSDI’08 Alan Mislove

Do messages get delayed?

Very few messages get delayed

28

Classification delay (h) Fraction delayed Average delivery delay (h)

2 1.3% 4.1 6 1.3% 16.6

slide-65
SLIDE 65

16.04.2008 NSDI’08 Alan Mislove

Related work

Preventing unwanted communication

Content filtering: DSPAM, SpamAssassin Whitelisting: LinkedIn, RE: [NSDI’06]

Using social networks

PGP Web of Trust SybilGuard [SIGCOMM’06] SybilLimit [Oakland’08]

29

slide-66
SLIDE 66

16.04.2008 NSDI’08 Alan Mislove

Conclusion

Ostra: a new approach to preventing unwanted communication

Inspired by offline trust

Leverages social network that often already exists Desirable properties

Does not require global user identities Does not rely on automatic content classification Respects recipient’s notion of unwanted communication

Can be applied to messaging, as well as content sharing

30

slide-67
SLIDE 67

16.04.2008 NSDI’08 Alan Mislove

Questions?

31

slide-68
SLIDE 68

16.04.2008 NSDI’08 Alan Mislove 32

slide-69
SLIDE 69

Bound on amount of spam becomes bound on rate of spam

d ∗ N ∗ |L| + S

16.04.2008 NSDI’08 Alan Mislove

Updated guarantees

33

System decay Rate of incoming spam Number of links Lower bound

slide-70
SLIDE 70

16.04.2008 NSDI’08 Alan Mislove

What’s up with U and L?

Link balance B and bounds [L,U] are from one user’s perspective

Link can be viewed from from other’s perspective, too

For link X ↔ Y, all values symmetric

BX = −BY LX = −UY UX = −LY

34

=

slide-71
SLIDE 71

16.04.2008 NSDI’08 Alan Mislove

Why can’t I receive when B=U?

When B=U on a link

For other user, B=L

Thus, other user can’t send

So you can’t receive

35

=

slide-72
SLIDE 72

16.04.2008 NSDI’08 Alan Mislove

Full decentralization

So far, assumed a centralized site

Keeps link state Finds paths

In paper, sketch of decentralized design

Routing using techniques from MANETs Link state is kept decentralized

Work in progress

36

slide-73
SLIDE 73

16.04.2008 NSDI’08 Alan Mislove

Can attackers target users?

Can attackers prevent users from receiving messages?

Send victim lots of unwanted communication Victim has too much credit to receive

But, victim has simple way out

Can “donate” credit to friends And attackers quickly run out of credit

37

slide-74
SLIDE 74

16.04.2008 NSDI’08 Alan Mislove

Who do people talk to?

Users communicate with close users

Reduces path computation complexity

38

0.2 0.4 0.6 0.8 1 1 2 3 4 5 6 7 CDF Distance between source and destination (hops) Observed Random Destination Selection

slide-75
SLIDE 75

16.04.2008 NSDI’08 Alan Mislove

More on content sharing

Why don’t links in the YouTube graph run out of credit?

39