Preventing Active Timing Attacks in Low-Latency Anonymous Communication

被引:0
|
作者
Feigenbaum, Joan [1 ]
Johnson, Aaron [2 ]
Syverson, Paul [3 ]
机构
[1] Yale Univ, New Haven, CT 06520 USA
[2] Univ Texas Austin, Austin, TX 78712 USA
[3] Naval Res Lab, Washington, DC 20375 USA
来源
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Low-latency anonymous communication protocols in general, and the popular onion-routing protocol in particular, are broken against simple timing attacks. While there have been few proposed solutions to this problem when the adversary is active, several padding schemes have been proposed to defend against a passive adversary that just observes timing patterns. Unfortunately active adversaries can break padding schemes by inserting delays and dropping messages. We present a protocol that provides anonymity against an active adversary by using a black-box padding scheme that is effective against a passive adversary. Our protocol reduces, in some sense, providing anonymous communication against active attacks to providing a padding scheme against passive attacks. Our analytical results show that anonymity can be made arbitrarily good at the cost of some added latency and required bandwidth. We also perform measurements on the Tor network to estimate the real-world performance of our protocol, showing that the added delay is not excessive.
引用
收藏
页码:166 / +
页数:3
相关论文
共 50 条
  • [1] Timing attacks in low-latency mix systems
    Levine, BN
    Reiter, MK
    Wang, CX
    Wright, M
    FINANCIAL CRYPTOGRAPHY, 2004, 3110 : 251 - 265
  • [2] Timing analysis in low-latency mix networks: Attacks and defenses
    Shmatikov, Vitaly
    Wang, Ming-Hsiu
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 18 - +
  • [3] Network flow watermarking attack on low-latency anonymous communication systems
    Wang, Xinyuan
    Chen, Shiping
    Jajodia, Sushil
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 116 - +
  • [4] Research on the anti-attack design principles of low-latency anonymous communication
    Zheng, Ming
    Duan, Haixin
    Wu, Jianping
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 651 - 658
  • [5] A Novel Method to Prevent Traffic Analysis in Low-latency Anonymous Communication Systems
    Zhang, Jia
    Duan, Haixin
    Wu, Jianping
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 906 - 911
  • [6] Study on Anti-Attack Model for Low-Latency Anonymous Communication System
    Sun Dongbin
    Liu Wu
    Sun Donghong
    Ren Ping
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 327 - +
  • [7] Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
    Mittal, Prateek
    Khurshid, Ahmed
    Juen, Joshua
    Caesar, Matthew
    Borisov, Nikita
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 215 - 226
  • [8] LiLAC: Lightweight Low-latency Anonymous Chat
    Podolanko, John P.
    Pobala, Revanth
    Mucklai, Hussain
    Danezis, George
    Wright, Matthew
    2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 141 - 151
  • [9] Design principles for low latency anonymous network systems secure against timing attacks
    Wiangsripanawan, Rungrat
    Susilo, Willy
    Safavi-Naini, Rei
    Conferences in Research and Practice in Information Technology Series, 2007, 68 : 183 - 191
  • [10] Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
    Abraham, Titus
    Wright, Matthew
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,