Instant Degradation of Anonymity in Low-Latency Anonymisation Systems

被引:0
|
作者
Ries, Thorsten [1 ]
State, Radu [1 ]
Engel, Thomas [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, Luxembourg, Luxembourg
来源
关键词
TRAFFIC ANALYSIS; ATTACKS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Low-latency anonymisation systems are very popular, both in academic research and in operational environments. Several attacks against these systems exist aiming to reveal the identity of a particular user, mostly by trying to assign the real IP address of the sender to a known connection. Nevertheless, the hidden identity of a user is not only based on the IP address, also location information can be of relevance. In this paper, we propose an alternative approach to instantly disclose the location of users based on Round Trip Time measurements. Even if the identity of a user can not be revealed, the correlated location information may already provide sufficient information to degrade the level of anonymity significantly. Our attack is based on virtual network coordinate systems, mapping physical nodes to a n-dimensional space to reveal a geographical proximity. Taking advantage of this feature, we define a model that leverages network coordinates based on only a single connection of a user to a malicious website for instance. Evaluation on the Planet-Lab research network proves that by the use of our proposed model a local attacker has good chance to disclose the location of a user and to utilise this information to create an low-latency anonymity system independent anonymity measure.
引用
收藏
页码:98 / 108
页数:11
相关论文
共 50 条
  • [1] Metrics for security and performance in low-latency anonymity systems
    Murdoch, Steven J.
    Watson, Robert N. M.
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2008, 5134 : 115 - 132
  • [2] Transparent Low-Latency Network Anonymisation for Mobile Devices
    Byrenheid, Martin
    Koepsell, Stefan
    Naumenko, Alexander
    Strufe, Thorsten
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 193 - 209
  • [3] Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks
    Diaz, Claudia
    Murdoch, Steven J.
    Troncoso, Carmela
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2010, 6205 : 184 - +
  • [4] Performance comparison of low-latency anonymisation services from a user perspective
    Wendolsky, Rolf
    Herrmann, Dominik
    Federrath, Hannes
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2007, 4776 : 233 - +
  • [5] Deploying low-latency anonymity - Design challenges and social factors
    Dingledine, Roger
    Mathewson, Nick
    Syverson, Paul
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (05) : 83 - 87
  • [6] A longitudinal approach to measuring the impact of mobility on low-latency anonymity networks
    Doswell, Stephen
    Aslam, Nauman
    Kendall, David
    Sexton, Graham
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 108 - 113
  • [7] A low-latency modular switch for CMP systems
    Roca, Antoni
    Flich, Jose
    Silla, Federico
    Duato, Jose
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2011, 35 (08) : 742 - 754
  • [8] Timing attacks in low-latency mix systems
    Levine, BN
    Reiter, MK
    Wang, CX
    Wright, M
    [J]. FINANCIAL CRYPTOGRAPHY, 2004, 3110 : 251 - 265
  • [9] Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
    Chakravarty, Sambuddho
    Stavrou, Angelos
    Keromytis, Angelos D.
    [J]. COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 249 - +
  • [10] Low-latency trading
    Hasbrouck, Joel
    Saar, Gideon
    [J]. JOURNAL OF FINANCIAL MARKETS, 2013, 16 (04) : 646 - 679