Metrics for security and performance in low-latency anonymity systems

被引:0
|
作者
Murdoch, Steven J. [1 ]
Watson, Robert N. M. [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB2 1TN, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we explore the tradeoffs between security and performance in anonymity networks such as Tor. Using probability of path compromise -,Is a measure of security, we explore the behaviour of various path selection algorithms with a Tor path simulator. We denionstrate that assumptions about the relative expense of IP addresses and cheapness of bandwidth break down if attackers are allowed to purchase access to botnets, giving plentiful IP addresses, but each with relatively poor symmetric bandwidth. We further propose that the expected latency of data sent through a network is a useful performance metric, show how it juay be calculated, and demonstrate the counter-intuitive result that Tor's current path selection scheme, designed for performance, both performs well and is good for anonyinity in the presence of a botnetbased adversary.
引用
收藏
页码:115 / 132
页数:18
相关论文
共 50 条
  • [1] Instant Degradation of Anonymity in Low-Latency Anonymisation Systems
    Ries, Thorsten
    State, Radu
    Engel, Thomas
    [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 98 - 108
  • [2] Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks
    Diaz, Claudia
    Murdoch, Steven J.
    Troncoso, Carmela
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2010, 6205 : 184 - +
  • [3] Deploying low-latency anonymity - Design challenges and social factors
    Dingledine, Roger
    Mathewson, Nick
    Syverson, Paul
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (05) : 83 - 87
  • [4] Performance modeling and evaluation of topologies for low-latency SCI systems
    Gonzalez, DM
    George, AD
    Chidester, MC
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2001, 25 (07) : 343 - 356
  • [5] A longitudinal approach to measuring the impact of mobility on low-latency anonymity networks
    Doswell, Stephen
    Aslam, Nauman
    Kendall, David
    Sexton, Graham
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 108 - 113
  • [6] Low-latency and high-reliability performance analysis of relay systems
    Long, Hang
    Xiang, Wei
    Sun, Yao
    [J]. IET COMMUNICATIONS, 2018, 12 (05) : 627 - 633
  • [7] YASIR: A low-latency, high-integrity security retrofit for legacy SCADA systems
    Tsang, Patrick P.
    Smith, Sean W.
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 445 - 459
  • [8] A Low-Latency and Flexible TDM NoC for Strong Isolation in Security-Critical Systems
    Gorgues Alonso, Miguel
    Flich, Jose
    Turki, Meriem
    Bertozzi, Davide
    [J]. 2019 IEEE 13TH INTERNATIONAL SYMPOSIUM ON EMBEDDED MULTICORE/MANY-CORE SYSTEMS-ON-CHIP (MCSOC 2019), 2019, : 149 - 156
  • [9] A low-latency modular switch for CMP systems
    Roca, Antoni
    Flich, Jose
    Silla, Federico
    Duato, Jose
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2011, 35 (08) : 742 - 754
  • [10] Timing attacks in low-latency mix systems
    Levine, BN
    Reiter, MK
    Wang, CX
    Wright, M
    [J]. FINANCIAL CRYPTOGRAPHY, 2004, 3110 : 251 - 265