Correlation-Based Traffic Analysis Attacks on Anonymity Networks

被引:30
|
作者
Zhu, Ye [1 ]
Fu, Xinwen [2 ]
Gramham, Bryan [3 ]
Bettati, Riccardo [3 ]
Zhao, Wei [4 ]
机构
[1] Cleveland State Univ, Dept Elect & Comp Engn, Cleveland, OH 44120 USA
[2] Dakota State Univ, Coll Business & Informat Syst, Madison, SD 57042 USA
[3] Texas A&M Univ, Dept Comp Sci, College Stn, TX 77843 USA
[4] Univ Macau, Taipa, Macau, Peoples R China
关键词
Privacy; mixes; anonymity; anonymous communication; flow-correlation attack;
D O I
10.1109/TPDS.2009.146
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures to defeat traffic analysis attacks. In this paper, we focus on a particular class of traffic analysis attacks, flow-correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link with that over an output link. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. Based on our threat model and known strategies in existing mix networks, we perform extensive experiments to analyze the performance of mixes. We find that all but a few batching strategies fail against flow-correlation attacks, allowing the adversary to either identify ingress and egress points of a flow or to reconstruct the path used by the flow. Counterintuitively, some batching strategies are actually detrimental against attacks. The empirical results provided in this paper give an indication to designers of Mix networks about appropriate configurations and mechanisms to be used to counter flow-correlation attacks.
引用
收藏
页码:954 / 967
页数:14
相关论文
共 50 条
  • [1] POSTER: Traffic Analysis Attacks in Anonymity Networks
    Kohis, Katharina
    Popper, Christina
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 917 - 919
  • [2] Anonymity analysis of mix networks against flow-correlation attacks
    Zhu, Y
    Fu, XW
    Bettati, R
    Zhao, W
    [J]. GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1801 - 1805
  • [3] Correlation-based approach to analysis of spiking networks
    Michael Krumin
    Shy Shoham
    [J]. BMC Neuroscience, 11 (Suppl 1)
  • [4] Correlation-based biological networks
    Song, Won-Min
    Aste, Tomaso
    Di Matteo, T.
    [J]. COMPLEX SYSTEMS II, 2008, 6802
  • [5] Correlation-based advanced feature analysis for wireless sensor networks
    JongHyuk Kim
    Yong Moon
    Hoon Ko
    [J]. The Journal of Supercomputing, 2024, 80 : 9812 - 9828
  • [6] Correlation-based advanced feature analysis for wireless sensor networks
    Kim, Jonghyuk
    Moon, Yong
    Ko, Hoon
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (07): : 9812 - 9828
  • [7] Correlation-based Detection of PMU Time Synchronization Attacks
    Shereen, Ezzeldin
    Dan, Gyorgy
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONTROL, AND COMPUTING TECHNOLOGIES FOR SMART GRIDS (SMARTGRIDCOMM), 2018,
  • [8] Explosive percolation in correlation-based networks
    Remondini, D.
    [J]. NUOVO CIMENTO C-COLLOQUIA AND COMMUNICATIONS IN PHYSICS, 2011, 34 (05): : 203 - 207
  • [10] Correlation-based data broadcasting in wireless networks
    Cai, KK
    Lin, HZ
    Chen, C
    [J]. DATABASE: ENTERPRISE, SKILLS AND INNOVATION, PROCEEDINGS, 2005, 3567 : 111 - 119