Detection and analysis of eavesdropping in anonymous communication networks

被引:0
|
作者
Sambuddho Chakravarty
Georgios Portokalidis
Michalis Polychronakis
Angelos D. Keromytis
机构
[1] Columbia University,
[2] Stevens Institute of Technology,undefined
关键词
Tor; Anonymity networks; Proxies; Eavesdropping; Decoys;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymous communication networks, like Tor, partially protect the confidentiality of user traffic by encrypting all communications within the overlay network. However, when the relayed traffic reaches the boundaries of the network, toward its destination, the original user traffic is inevitably exposed to the final node on the path. As a result, users transmitting sensitive data, like authentication credentials, over such networks, risk having their data intercepted and exposed, unless end-to-end encryption is used. Eavesdropping can be performed by malicious or compromised relay nodes, as well as any rogue network entity on the path toward the actual destination. Furthermore, end-to-end encryption does not assure defense against man-in-the-middle attacks. In this work, we explore the use of decoys at multiple levels for the detection of traffic interception by malicious nodes of proxy-based anonymous communication systems. Our approach relies on the injection of traffic that exposes bait credentials for decoy services requiring user authentication, and URLs to seemingly sensitive decoy documents which, when opened, invoke scripts alerting about being accessed. Our aim was to entice prospective eavesdroppers to access our decoy servers and decoy documents, using the snooped credentials and URLs. We have deployed our prototype implementation in the Tor network using decoy IMAP, SMTP, and HTTP servers. During the course of over 30 months, our system has detected 18 cases of traffic eavesdropping that involved 14 different Tor exit nodes.
引用
收藏
页码:205 / 220
页数:15
相关论文
共 50 条
  • [1] Detection and analysis of eavesdropping in anonymous communication networks
    Chakravarty, Sambuddho
    Portokalidis, Georgios
    Polychronakis, Michalis
    Keromytis, Angelos D.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (03) : 205 - 220
  • [2] An Analysis of Attacks Against Anonymous Communication Networks
    Lu, Tianbo
    Yao, Puxin
    Zhao, Lingling
    Li, Yang
    Xie, Feng
    Xia, Yamei
    2014 7th International Conference on Security Technology (SecTech), 2014, : 38 - 40
  • [3] REDUCING COMMUNICATION DETECTION AND EAVESDROPPING USING MOBILE AGENT RELAY NETWORKS
    Kwak, Hyon
    Borghetti, Brett
    PROCEEDINGS OF THE 2010 WINTER SIMULATION CONFERENCE, 2010, : 2832 - 2841
  • [4] A Model of Social Eavesdropping in Communication Networks
    Bighash, Leila
    Alexander, Kristen S.
    Hagen, Christina S.
    Hollingshead, Andrea B.
    INTERNATIONAL JOURNAL OF COMMUNICATION, 2020, 14 : 3704 - 3726
  • [5] A probabilistic model for anonymity analysis of anonymous communication networks
    Almasizadeh, Jaafar
    Azgomi, Mohammad Abdollahi
    TELECOMMUNICATION SYSTEMS, 2018, 69 (02) : 171 - 186
  • [6] A probabilistic model for anonymity analysis of anonymous communication networks
    Jaafar Almasizadeh
    Mohammad Abdollahi Azgomi
    Telecommunication Systems, 2018, 69 : 171 - 186
  • [7] Anonymous communication in overlay networks
    Ren, Jian
    Li, Yun
    Jiang, Tingting
    Li, Tongtong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 229 - 240
  • [8] Anonymous communication protocol in overlay networks
    Ren, Jian
    Li, Tongtong
    Han, Keesook
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1648 - +
  • [9] On performance bottleneck of anonymous communication networks
    Pries, Ryan
    Yu, Wei
    Graham, Steve
    Fu, Xinwen
    2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 1043 - +
  • [10] Anonymous group communication in mobile networks
    Cimato, S
    D'Arco, P
    Visconti, I
    THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2003, 2841 : 316 - 328