Detection and analysis of eavesdropping in anonymous communication networks

被引:0
|
作者
Sambuddho Chakravarty
Georgios Portokalidis
Michalis Polychronakis
Angelos D. Keromytis
机构
[1] Columbia University,
[2] Stevens Institute of Technology,undefined
关键词
Tor; Anonymity networks; Proxies; Eavesdropping; Decoys;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymous communication networks, like Tor, partially protect the confidentiality of user traffic by encrypting all communications within the overlay network. However, when the relayed traffic reaches the boundaries of the network, toward its destination, the original user traffic is inevitably exposed to the final node on the path. As a result, users transmitting sensitive data, like authentication credentials, over such networks, risk having their data intercepted and exposed, unless end-to-end encryption is used. Eavesdropping can be performed by malicious or compromised relay nodes, as well as any rogue network entity on the path toward the actual destination. Furthermore, end-to-end encryption does not assure defense against man-in-the-middle attacks. In this work, we explore the use of decoys at multiple levels for the detection of traffic interception by malicious nodes of proxy-based anonymous communication systems. Our approach relies on the injection of traffic that exposes bait credentials for decoy services requiring user authentication, and URLs to seemingly sensitive decoy documents which, when opened, invoke scripts alerting about being accessed. Our aim was to entice prospective eavesdroppers to access our decoy servers and decoy documents, using the snooped credentials and URLs. We have deployed our prototype implementation in the Tor network using decoy IMAP, SMTP, and HTTP servers. During the course of over 30 months, our system has detected 18 cases of traffic eavesdropping that involved 14 different Tor exit nodes.
引用
收藏
页码:205 / 220
页数:15
相关论文
共 50 条
  • [31] Time and Communication Complexity of Leader Election in Anonymous Networks
    Kowalski, Dariusz R.
    Mosteiro, Miguel A.
    2021 IEEE 41ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2021), 2021, : 449 - 460
  • [32] De-Anonymizing and Countermeasures in Anonymous Communication Networks
    Yang, Ming
    Luo, Junzhou
    Ling, Zhen
    Fu, Xinwen
    Yu, Wei
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) : 60 - 66
  • [33] An efficient anonymous communication protocol for wireless sensor networks
    Chen, Juan
    Du, Xiaojiang
    Fang, Binxing
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (14): : 1302 - 1312
  • [34] Eavesdropping and communication networks revealed through playback and an acoustic location system
    Fitzsimmons, Lauren P.
    Foote, Jennifer R.
    Ratcliffe, Laurene M.
    Mennill, Daniel J.
    BEHAVIORAL ECOLOGY, 2008, 19 (04) : 824 - 829
  • [35] Eavesdropping Interference in Wireless Communication Networks Based on Physical Layer Security
    Chen, Mingming
    Chen, Yuzhi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (09) : 395 - 408
  • [36] Anonymous collision detection for practical quantum networks
    Zheng, Wangsheng
    Gong, Beili
    PHYSICS LETTERS A, 2024, 525
  • [37] Quantum anonymous collision detection for quantum networks
    Khan, Awais
    Khalid, Uman
    Ur Rehman, Junaid
    Lee, Kyesan
    Shin, Hyundong
    EPJ QUANTUM TECHNOLOGY, 2021, 8 (01)
  • [38] Quantum anonymous collision detection for quantum networks
    Awais Khan
    Uman Khalid
    Junaid ur Rehman
    Kyesan Lee
    Hyundong Shin
    EPJ Quantum Technology, 2021, 8
  • [39] Modeling and Analysis of the Performance and Security for Anonymous Communication
    Yang, Ming
    Luo, Junzhou
    Wu, Wenjia
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 383 - 388
  • [40] Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks
    Xu, Ding
    Zhu, Hongbo
    Li, Qun
    IEEE ACCESS, 2019, 7 : 20363 - 20380