Defending anonymous communications against passive logging attacks

被引:40
作者
Wright, M [1 ]
Adler, M [1 ]
Levine, BN [1 ]
Shields, C [1 ]
机构
[1] Univ Massachusetts, Dept Comp Sci, Amherst, MA 01003 USA
来源
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2003年
关键词
D O I
10.1109/SECPRI.2003.1199325
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the threat that passive logging attacks pose to anonymous communications. Previous work analyzed these attacks under limiting assumptions. We first describe a possible defense that comes from breaking the assumption of uniformly random path selection. Our analysis shows that the. defense improves anonymity in the static model, where nodes stay in the system, but fails in a dynamic model, in which nodes leave and join. Additionally, we use the dynamic model to show that. the intersection attack creates a vulnerability in certain peer-to-peer systems for anonymous communciations. We present simulation results that show that attack times are significantly lower in practice than the upper bounds given by previous work. To determine whether users' web traffic has communication patterns required by the attacks, we collected and analyzed the web requests of users. We found that, for our study, frequent and repeated communication to the same web site is common.
引用
收藏
页码:28 / 41
页数:14
相关论文
共 21 条
[1]  
BACK A, 2000, FREEDOM 2 0 SECURITY
[2]  
BARYSHNIKOV Y, 2002, EE2005141 COL U COMP
[3]  
BERTHOLD O, 2000, COMP FREED PRIV C 20
[4]  
CHU J, 2002, P ITC SCAL TRAFF CON, V4868
[5]  
DAVISON DB, 2002, 13 ACM C HYP HYP HT, P159
[6]  
Duchamp D, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE 2ND USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS (USITS'99), P127
[7]  
FEDERATH H, JAP TOOL PRIVACY INT
[8]  
FREEDMAN MJ, 2002, P ACM C COMP COMM SE
[9]  
GRIBBLE SD, 1997, UC BERKELEY HOME IP
[10]  
KESDOGAN D, 1998, INFORMATION HIDING