Detection and analysis of eavesdropping in anonymous communication networks

被引:0
|
作者
Sambuddho Chakravarty
Georgios Portokalidis
Michalis Polychronakis
Angelos D. Keromytis
机构
[1] Columbia University,
[2] Stevens Institute of Technology,undefined
关键词
Tor; Anonymity networks; Proxies; Eavesdropping; Decoys;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymous communication networks, like Tor, partially protect the confidentiality of user traffic by encrypting all communications within the overlay network. However, when the relayed traffic reaches the boundaries of the network, toward its destination, the original user traffic is inevitably exposed to the final node on the path. As a result, users transmitting sensitive data, like authentication credentials, over such networks, risk having their data intercepted and exposed, unless end-to-end encryption is used. Eavesdropping can be performed by malicious or compromised relay nodes, as well as any rogue network entity on the path toward the actual destination. Furthermore, end-to-end encryption does not assure defense against man-in-the-middle attacks. In this work, we explore the use of decoys at multiple levels for the detection of traffic interception by malicious nodes of proxy-based anonymous communication systems. Our approach relies on the injection of traffic that exposes bait credentials for decoy services requiring user authentication, and URLs to seemingly sensitive decoy documents which, when opened, invoke scripts alerting about being accessed. Our aim was to entice prospective eavesdroppers to access our decoy servers and decoy documents, using the snooped credentials and URLs. We have deployed our prototype implementation in the Tor network using decoy IMAP, SMTP, and HTTP servers. During the course of over 30 months, our system has detected 18 cases of traffic eavesdropping that involved 14 different Tor exit nodes.
引用
收藏
页码:205 / 220
页数:15
相关论文
共 50 条
  • [41] A Framework for Formal Analysis of Anonymous Communication Protocols
    Yang, Ke
    Xiao, Meihua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [42] CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks
    Sommer, David
    Dhar, Aritra
    Malisa, Luka
    Mohammadi, Esfandiar
    Ronzani, Daniel
    Capkun, Srdjan
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 3 - 3
  • [43] Optimized Flow Allocation for Anonymous Communication in Multipath Wireless Networks
    Yang, Chouchang
    Alomair, Basel
    Poovendran, Radha
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012, : 219 - 223
  • [44] Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks
    Xia, Yusheng
    Chen, Rongmao
    Su, Jinshu
    Pan, Chen
    Su, Han
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [45] PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks
    Elahi, Tariq
    Danezis, George
    Goldberg, Ian
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1068 - 1079
  • [46] MIC: An Efficient Anonymous Communication System in Data Center Networks
    Zhu, Tingwei
    Feng, Dan
    Hua, Yu
    Wang, Fang
    Shi, Qingyu
    Liu, Jiahao
    PROCEEDINGS 45TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING - ICPP 2016, 2016, : 11 - 20
  • [47] A Survey on Anonymous Communication Systems With a Focus on Dining Cryptographers Networks
    Shirali, Mohsen
    Tefke, Tobias
    Staudemeyer, Ralf C.
    Pohls, Henrich C.
    IEEE ACCESS, 2023, 11 : 18631 - 18659
  • [48] Legitimate eavesdropping of wireless powered suspicious communication networks with a monitoring power station
    Xu, Ding
    PHYSICAL COMMUNICATION, 2020, 42
  • [49] Jamming-Assisted Legitimate Eavesdropping and Secure Communication in Multicarrier Interference Networks
    Xu, Ding
    Zhu, Hongbo
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 954 - 965
  • [50] QUICKEST CHANGE DETECTION IN ANONYMOUS HETEROGENEOUS SENSOR NETWORKS
    Sun, Zhongchang
    Zou, Shaofeng
    Li, Qunwei
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 5925 - 5929