Detection and analysis of eavesdropping in anonymous communication networks

被引:0
|
作者
Sambuddho Chakravarty
Georgios Portokalidis
Michalis Polychronakis
Angelos D. Keromytis
机构
[1] Columbia University,
[2] Stevens Institute of Technology,undefined
关键词
Tor; Anonymity networks; Proxies; Eavesdropping; Decoys;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymous communication networks, like Tor, partially protect the confidentiality of user traffic by encrypting all communications within the overlay network. However, when the relayed traffic reaches the boundaries of the network, toward its destination, the original user traffic is inevitably exposed to the final node on the path. As a result, users transmitting sensitive data, like authentication credentials, over such networks, risk having their data intercepted and exposed, unless end-to-end encryption is used. Eavesdropping can be performed by malicious or compromised relay nodes, as well as any rogue network entity on the path toward the actual destination. Furthermore, end-to-end encryption does not assure defense against man-in-the-middle attacks. In this work, we explore the use of decoys at multiple levels for the detection of traffic interception by malicious nodes of proxy-based anonymous communication systems. Our approach relies on the injection of traffic that exposes bait credentials for decoy services requiring user authentication, and URLs to seemingly sensitive decoy documents which, when opened, invoke scripts alerting about being accessed. Our aim was to entice prospective eavesdroppers to access our decoy servers and decoy documents, using the snooped credentials and URLs. We have deployed our prototype implementation in the Tor network using decoy IMAP, SMTP, and HTTP servers. During the course of over 30 months, our system has detected 18 cases of traffic eavesdropping that involved 14 different Tor exit nodes.
引用
收藏
页码:205 / 220
页数:15
相关论文
共 50 条
  • [21] A hierarchical anonymous communication protocol for sensor networks
    Durresi, A
    Paruchuri, V
    Durresi, M
    Barolli, L
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005, 2005, 3824 : 1123 - 1132
  • [22] A hierarchical anonymous communication protocol for sensor networks
    Durresi, A. (durresi@csc.lsu.edu), (Springer Verlag):
  • [23] Achieving anonymous communication in ad hoc networks
    Cheng, Dapeng
    Han, Jinsong
    Li, Mo
    Yang, Baijian
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1547 - +
  • [24] Convolutional Neural Networks for Fiber-Bending Eavesdropping Attacks Detection in Coherent Optical Communication Systems
    Qin, Wenshuai
    Zhang, Qihan
    Hou, Weigang
    Zhang, Xu
    Gong, Xiaoxue
    2024 INTERNATIONAL CONFERENCE ON UBIQUITOUS COMMUNICATION, UCOM 2024, 2024, : 342 - 345
  • [25] Effects of territorial intrusions on eavesdropping neighbors: communication networks in nightingales
    Naguib, M
    Amrhein, V
    Kunc, HP
    BEHAVIORAL ECOLOGY, 2004, 15 (06) : 1011 - 1015
  • [26] Predator-Prey Interactions and Eavesdropping in Vibrational Communication Networks
    Virant-Doberlet, Meta
    Kuhelj, Anka
    Polajnar, Jernej
    Sturm, Rok
    FRONTIERS IN ECOLOGY AND EVOLUTION, 2019, 7
  • [27] An analysis study on zone-based anonymous communication in mobile ad hoc networks
    Wu, Xiaoxin
    Bertino, Elisa
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 252 - 265
  • [28] An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
    Sen, Jaydip
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 580 - 592
  • [29] On flow marking attacks in wireless anonymous communication networks
    Fu, XW
    Zhu, Y
    Graham, B
    Bettati, R
    Zhao, W
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, : 493 - 503
  • [30] A new replay attack against anonymous communication networks
    Pries, Ryan
    Yu, Wei
    Fu, Xinwen
    Zhao, Wei
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1578 - +