On the Analysis of the Predecessor Attack on Anonymity Systems

نویسندگان

  • Daniel R. Figueiredo
  • Philippe Nain
  • Don Towsley
چکیده

Systems that allow users to communicate anonymously with a destination have received increasingly more attention since users of network applications became more concerned with their privacy. Unfortunately, anonymity systems are vulnerable to attacks that attempt to reveal the identity of nodes that communicate anonymously. Moreover, the distributed nature of such systems facilitates certain types of attacks. In this paper we focus on the predecessor attack, a robust traffic analysis attack that targets nodes that communicate with the same destination repeatedly over time. In particular, we perform a qualitative analysis of the attack using a generalized model for anonymous communication. We establish the necessary and sufficient conditions for the attack to succeed and also determine the effort required by the attacker. We consider different situations and investigate the scenario where multiple nodes communicate with the same destination. Our results show that for a common class of protocols, where paths are constructed uniformly at random, the attack always succeeds and the effort required is proportional to the number of initiators and the number of nodes in the system. Moreover, knowing the number of initiators present in the system does not reduce the effort required by the attacker. Understanding the capabilities and limitations of this attack is an important step toward designing more secure anonymity systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

متن کامل

One Fast Guard for Life (or 9 months)

“Entry Guards” in the Tor anonymity network mitigate against several traffic analysis attacks including the “predecessor” attack, statistical profiling, and passive AS-level correlation attacks. Several recent works have shown that the current design does not provide sufficient mitigation against these attacks and may also introduce new vulnerabilities. We propose a simple response to these res...

متن کامل

The Dangers of Composing Anonymous Channels

We present traffic analyses of two anonymous communications schemes that build on the classic Crowds/Hordes protocols. The AJSS10 [1] scheme combines multiple Crowds-like forward channels with a Hordes reply channel in an attempt to offer robustness in a mobile environment. We show that the resulting scheme fails to guarantee the claimed k-anonymity, and is in fact more vulnerable to malicious ...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004