Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation

被引:0
|
作者
Chakravarty, Sambuddho [1 ]
Stavrou, Angelos [2 ]
Keromytis, Angelos D. [1 ]
机构
[1] Columbia Univ, New York, NY 10027 USA
[2] George Mason Univ, George Town, Malaysia
来源
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we employ single-end controlled available bandwidth estimation tools and a colluding network entity that can modulate the traffic destined for the victim. To expose the circuit including the source, we inject a number of short or one large burst of traffic. Although timing attacks have been successful against anonymity networks, they require either a Global Adversary or the compromise of substantial number of anonymity nodes. Our technique does not require compromise of, or collaboration with, any such entity. To validate our attack, we performed a series of experiments using different network conditions and locations for the adversaries on both controlled and real-world Tor circuits. Our results demonstrate that our attack is successful in controlled environments. In real-world scenarios, even an under-provisioned adversary with only a few network vantage points can, under certain conditions, successfully identify the IP address of both Tor users and Hidden Servers. However, TOr'S inherent circuit scheduling results in limited quality of service for its users. This at times leads to increased false negatives and it can degrade the performance of our circuit detection. We believe that as high speed anonymity networks become readily available, a well-provisioned adversary, with a partial or inferred network "map", will be able to partially or fully expose anonymous users.
引用
收藏
页码:249 / +
页数:5
相关论文
共 50 条
  • [1] Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks
    Diaz, Claudia
    Murdoch, Steven J.
    Troncoso, Carmela
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2010, 6205 : 184 - +
  • [2] A longitudinal approach to measuring the impact of mobility on low-latency anonymity networks
    Doswell, Stephen
    Aslam, Nauman
    Kendall, David
    Sexton, Graham
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 108 - 113
  • [3] High-Bandwidth Low-Latency Approximate Interconnection Networks
    Fujiki, Daichi
    Ishii, Kiyo
    Fujiwara, Ikki
    Matsutani, Hiroki
    Amano, Hideharu
    Casanova, Henri
    Koibuchi, Michihiro
    [J]. 2017 23RD IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2017, : 469 - 480
  • [4] A Packet Delay Emulator for High-Bandwidth and Low-Latency Traffic in 5G Networks
    Bolla, Raffaele
    Bruschi, Roberto
    Davoli, Franco
    Lombardo, Chiara
    Mohammadpour, Alireza
    Rabbani, Ramin
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2843 - 2849
  • [5] Accurate Available Bandwidth Estimation Robust Against Traffic Differentiation in Operational MVNO Networks
    Oshiba, Takashi
    [J]. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 699 - 705
  • [6] Metrics for security and performance in low-latency anonymity systems
    Murdoch, Steven J.
    Watson, Robert N. M.
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2008, 5134 : 115 - 132
  • [7] An Effective Available Bandwidth Estimation Algorithm for the Networks with Bursty Traffic
    Li, Mingfu
    Wu, Yuehlin
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 610 - 615
  • [8] Instant Degradation of Anonymity in Low-Latency Anonymisation Systems
    Ries, Thorsten
    State, Radu
    Engel, Thomas
    [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 98 - 108
  • [9] Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
    Mittal, Prateek
    Khurshid, Ahmed
    Juen, Joshua
    Caesar, Matthew
    Borisov, Nikita
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 215 - 226
  • [10] Bandwidth Prediction in Low-Latency Chunked Streaming
    Bentaleb, Abdelhak
    Timmerer, Christian
    Begen, Ali C.
    Zimmermann, Roger
    [J]. PROCEEDINGS OF THE 29TH ACM WORKSHOP ON NETWORK AND OPERATING SYSTEMS SUPPORT FOR DIGITAL AUDIO AND VIDEO (NOSSDAV'19), 2019, : 7 - 13