A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

被引:2
|
作者
Chao, Daichong [1 ]
Xu, Dawei [1 ,2 ]
Gao, Feng [3 ]
Zhang, Chuan [3 ]
Zhang, Weiting [4 ]
Zhu, Liehuang [3 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Cybersecur, Changchun 130022, Peoples R China
[3] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[4] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
来源
关键词
Security; Peer-to-peer computing; Internet; Routing; Surveys; Tutorials; Privacy; Anonymity network; attack; vulnerability; defense; formal security; TRAFFIC ANALYSIS; TOR; AUTHENTICATION; ALGORITHMS;
D O I
10.1109/COMST.2024.3350006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of safeguarding individuals' privacy rights in online activities is unmistakable in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous anonymity networks with different objectives and design principles have emerged, providing a diverse range of applications for privacy-conscious users. However, security issues in anonymity networks have persistently existed and continue to impact their survival and development. Each anonymity network presents distinct security challenges, making it more challenging for researchers to achieve a comprehensive and systematic understanding of their security. The current literature exhibits some unavoidable gaps, including the lack of vulnerability perspectives, a unified understanding of diverse attack types, defense perspectives, and theoretical perspectives. To address these gaps, we investigate prevailing attacks targeting anonymity networks from the viewpoint of network designers and operators. We use Tor, I2P, and Freenet (arguably the three most popular anonymity networks) as case studies. Starting with these attacks, we conduct an in-depth analysis of the vulnerabilities underlying them and explore related defense mechanisms and formal security. Specifically, we classify vulnerabilities into external and internal categories, utilizing the protocol stack of an anonymity network to guide the categorization of internal vulnerabilities. Furthermore, we examine their root causes. In addition to these aspects, we emphasize the importance of formal security in researching the security of anonymity networks by integrating the investigated vulnerabilities, attacks, and defenses. Through this comprehensive, thorough, and unified approach, this paper aims to provide insights into the security of anonymity networks and offer general research findings. Finally, we discuss ongoing challenges and future directions in this specific area.
引用
收藏
页码:1775 / 1829
页数:55
相关论文
共 50 条
  • [41] Virtualized Network Functions Security Attacks and Vulnerabilities
    Aljuhani, Ahamed
    Alharbi, Talal
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [42] Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations
    Pu, Hongyi
    He, Liang
    Cheng, Peng
    Sun, Mingyang
    Chen, Jiming
    IEEE NETWORK, 2023, 37 (01): : 111 - 117
  • [43] Attacks and Defenses in the Data Plane of Networks
    Chasaki, Danai
    Wolf, Tilman
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 798 - 810
  • [44] Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
    Muhammad, Zia
    Anwar, Zahid
    Javed, Abdul Rehman
    Saleem, Bilal
    Abbas, Sidra
    Gadekallu, Thippa Reddy
    TECHNOLOGIES, 2023, 11 (03)
  • [45] Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs)
    Al-kahtani, Mohammed Saeed
    6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012), 2012,
  • [46] A Survey of Federated Learning: Review, Attacks, Defenses
    Yao, Zhongyi
    Cheng, Jieren
    Fu, Cebin
    Huang, Zhennan
    BIG DATA AND SECURITY, ICBDS 2023, PT I, 2024, 2099 : 166 - 177
  • [47] Attacks and defenses in user authentication systems: A survey
    Wang, Xuerui
    Yan, Zheng
    Zhang, Rui
    Zhang, Peng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 188
  • [48] Privacy Attacks and Defenses in Machine Learning: A Survey
    Liu, Wei
    Han, Xun
    He, Meiling
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 413 - 422
  • [49] Survey on adversarial attacks and defenses for object detection
    Wang, Xinxin
    Chen, Jing
    He, Kun
    Zhang, Zijun
    Du, Ruiying
    Li, Qiao
    She, Jisi
    Tongxin Xuebao/Journal on Communications, 2023, 44 (11): : 260 - 277
  • [50] POSTER: Traffic Analysis Attacks in Anonymity Networks
    Kohis, Katharina
    Popper, Christina
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 917 - 919