Anonymity in Tor-like systems under Timing Analysis: An Information Theoretic Perspective
نویسنده
چکیده
“Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit” http://www.torproject.org. Indeed, as first demonstrated in [1] and bolstered by many follow up studies since, timing attacks have continued to be a significant threat to anonymity in a Tor-like system. While timing attacks are only a subset of possible attacks on an anonymous system, resilience to timing attacks can be studied from an independent perspective. Protection of anonymity from timing analysis requires characterizing the information retrievable from timing, and consequently designing packet scheduling protocols for mixes that minimize this information. This paper provides an information theoretic perspective on the study and prevention of timing analysis, and briefly discusses the implications on the design of anonymous systems.
منابع مشابه
Improving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملThe Mis-entropists: New Approaches to Measures in Tor
Measuring path compromise in the anonymity system Tor is a problem of important and immediate interest. We discuss the drawbacks to the traditional anonymity network measure—entropy—and explore the advantages of an attackbased measure. Our perspective is that of an adversary with a bandwidth budget (a fixed amount of bandwidth he or she can compromise), and we derive theoretical and numerical r...
متن کاملComparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance
The most popular system for providing practical lowlatency anonymity on the Internet is Tor. However, many other tools besides Tor exist as both free and commercial solutions. In this paper, we consider ve most popular low-latency anonymisation services that represent the current state of the art: singlehop proxies (Perfect Privacy and free proxies) and Onion Routing based solutions (Tor, I2P, ...
متن کاملAnoA: A Framework For Analyzing Anonymous Communication Protocols Unified Definitions and Analyses of Anonymity Properties
Protecting individuals’ privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a fr...
متن کاملPIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval
Existing anonymous communication systems like Tor do not scale well as they require all users to maintain up-todate information about all available Tor relays in the system. Current proposals for scaling anonymous communication advocate a peer-to-peer (P2P) approach. While the P2P paradigm scales to millions of nodes, it provides new opportunities to compromise anonymity. In this paper, we step...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013