EECS 598–2 Computer & Network Security Paper summary of “Inferring Internet Denial-of-Service Activity” & “ZIA: Zero-Interaction Authentication” Name: Dong Kwan Lee UMID: 6225-5694 Summary of “Inferring Internet Denial-of-Service Activity” Most attackers use spoofed IP address to conceal their location and identity. Consequently, the packets appear to the victim to be arriving from one or more third parties. Moreover, attackers can launch more powerful DoS attacks by compromising a set of internet hosts and use them to attack another victim machine. Because there is no simple way to distinguish the good request from the bad, it can be difficult to defend against DoS flooding attacks. Hence a reasonable quantitative foundation of estimating the amount of DoS attacks may be necessary to understand the nature of DoS attacks. In this paper, D. Moore introduced the concept of “backscatter analysis” to estimate the number denial-of-service (DoS) activities on the internet. The key observation behind the proposed technique is that most DoS packets select its source address at random in the 32-bit IP address space. By monitoring the number of suspicious packets (unsolicited response, which may be generated by DoS victim machines) targeted to a subset of internet machines, one can estimate the number of total DoS attacks on the internet. Several important assumptions were made by the author. First, he assumed the randomness of spoofed IP address, which seems reasonable. However ingress filtering and distributed DoS attacks can impair this assumption. It may cause underestimation of the total number of DoS attacks. Second, he assumed reliable delivery of attack and backscatter packets to their destinations. This assumption may also cause underestimation, because during a large attack it is likely that attack packets (or even scatter packets) may be queued and dropped by some narrowband links. Firewall or intrusion detection system may drop those packets on purpose. Third assumption is that the unsolicited packets observed by the monitor represent backscatters. However some unsolicited packets is not related with attacks (for example random port scan) Overall the author argues that backscattering analysis may cause us to underestimate the total number of DoS attacks but this approach is sound and at worst provides a conservative estimate of current DoS activities. However more refined method which consider above limitations may be necessary. Summary of “Zero-Interaction Authentication” To protect data in a laptop, encryption is necessary wile the user absence. The goal of ZeroInteraction Authentication (ZIA) is to provide effective file encryption and decryption without reducing performance or usability. To achieve this goal, each on-disk file is encrypted by some symmetric key for safety, but all cached files are decrypted for performance when the laptop is under administration of authenticated users. In ZIA, file keys are stored on the laptop’s disk, encrypted by a key encrypting key. A token, which can be worn by a user, holds the key encrypting key and it communicates with a laptop over a short-range wireless link which is also encrypted. When the token is out of range, ZIA encrypts cached objects for safety. The cache retains these encrypted pages to minimize recovery time when the user returns. To prevent the disclosure of the key-encrypting keys, periodic rebinding between the user and token and between token and laptop shall be necessary, which can be performed infrequently. Binding between tokens and laptops shall be accomplished by mutual authentication and session key establishment using public key scheme. Time costing jobs of ZIA such as key acquisition and file decryption can be overlapped by disk access which also requires quite long time. Key caching and pre-fetching can also greatly reduce the need for laptop/token interaction. By this way the performance degradation by ZIA can be significantly reduced. This paper improves the limit of previous cryptographic file systems, which do not offer protection against physical attacks (vulnerable to the theft of laptop). Another advantage of ZIA is that it does not incur too much interference to the usability and its performance penalty under normal workloads is not severe (about 9% overhead above local file system). With moderate amount of overhead, ZIA can secure quite well the data stored in a laptop, but ZIA may limit background operations when the user is out of the laptop’s radio range.