Anonymity and traceability in cyberspace
نویسنده
چکیده
Traceability is the ability to map events in cyberspace, particularly on the Internet, back to real-world instigators, often with a view to holding them accountable for their actions. Anonymity is present when traceability fails. I examine how traceability on the Internet actually works, looking first at a classical approach from the late 1990s that emphasises the rôle of activity logging and reporting on the failures that are known to occur. Failures of traceability, with consequent unintentional anonymity, have continued as the technology has changed. I present an analysis that ascribes these failures to the mechanisms at the edge of the network being inherently inadequate for the burden that traceability places upon them. The underlying reason for this continuing failure is a lack of economic incentives for improvement. The lack of traceability at the edges is further illustrated by a new method of stealing another person's identity on an Ethernet Local Area Network that existing tools and procedures would entirely fail to detect. Preserving activity logs is seen, especially by Governments, as essential for the traceability of illegal cyberspace activity. I present a new and efficient method of processing email server logs to detect machines sending bulk unsolicited email " spam " or email infected with " viruses ". This creates a clear business purpose for creating logs, but the new detector is so effective that the logs can be discarded within days, which may hamper general traceability. Preventing spam would be far better than tracing its origin or detecting its transmission. Many analyse spam in economic terms, and wish to levy a small charge for sending each email. I consider an oft-proposed approach using computational " proof-of-work " that is elegant and anonymity preserving. I show that, in a world of high profit margins and insecure end-user machines, it is impossible to find a payment level that stops the spam without affecting legitimate usage of email. Finally, I consider a content-blocking system with a hybrid design that has been deployed by a UK Internet Service Provider to inhibit access to child pornography. I demonstrate that the two-level design can be circumvented at either level, that content providers can use the first level to attack the second, and that the selectivity of the first level can be used as an " oracle " to extract a list of the sites being blocked. Although many of these attacks can be countered, there …
منابع مشابه
Udk: 343.9 Phenomenal Exploration into Impact of Anonymity on Law and Order in Cyberspace
While information systems provide modern society with great convenience, it also poses new problems in maintaining social order. One of its negative influences is the anonymity of cyberspace, which makes identity tracing a noteworthy predicament which poses obstacles in detection and investigations. It has been found that cyber anonymity has critical impacts on criminal motivation, and the phen...
متن کاملAchieving Anonymity and Traceability in Wireless Networks
Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network...
متن کاملA Ticket Based Architecture for Providing Anonymity and Traceability in Wireless Mesh Network
A wireless mesh is a communication network made up of radio nodes organized in a mesh topology. A wireless mesh network help users to stay online anywhere, anytime for an unlimited time and it provide high security.In this paper we come across two issues one is anonymity and other is traceability. Anonymity provides protection for users to enjoy network services without being traced. Now a day’...
متن کاملAnonymity and closely related terms in the cyberspace: An analysis by example
Anonymity is generally conceived to be an integral part of user’s right to privacy. Without anonymity, many online activities would become prone to eavesdropping, making them potentially risky to use. This work highlights on the different aspects closely related to anonymity and argues that it is rather a multifaceted and contextual concept. To support this argumentation, the paper examines as ...
متن کاملAnonymity, Privacy and Cyberspace
This paper examines some of the issues relating to the protection of privacy on-line, specifically whether anonymity is a necessary and proportionate response to the issues raised. The subject is considered in the light of the relationship between anonymity and privacy, the application of existing data protection law, current proposals and the possibility that increased anonymous use of the Int...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005