首页> 外文会议>International Conference on Cyber Conflict >Anonymity networks and access to information during conflicts: Towards a distributed network organisation
【24h】

Anonymity networks and access to information during conflicts: Towards a distributed network organisation

机译:匿名网络和冲突期间的信息访问:建立分布式网络组织

获取原文

摘要

Access to information is crucial during conflicts and other critical events such as population uprisings. An increasing number of social interactions happen in the cyberspace, while information exchanges at the infrastructural level (monitoring systems, sensor networks, etc.) are now also based on Internet and wireless links rather than ad hoc, isolated wired networks. However, the nature of the Internet allows powerful hostile actors to block, censor, or redirect communication to and from specific Internet services, through a number of available techniques. Anonymity networks such as Tor provide a way to circumvent traditional strategies for restricting access to online resources, and make communication harder to trace and identify. Tor, in particular, has been successfully used in past crises to evade censorship and Internet blockades (Egypt in 2011, and Iran in 2012). Anonymity networks can provide essential communication tools during conflicts, allowing information exchanges to be concealed from external observers, anonymised, and made resilient to imposed traffic controls and geographical restrictions. However, the design of networks such as Tor makes them vulnerable to large-scale denial of service attacks, as shown by the DDoS targeted at Tor hidden services in March 2015. In this paper, we analyse the structural weaknesses of Tor with regard to denial of service attacks, and propose a number of modifications to the structure of the Tor network aimed at improving its resilience to a large coordinated offensive run by a hostile actor in a conflict scenario. In particular, we introduce novel mechanisms that allow relay information to be propagated in a distributed and peer-to-peer manner. This eliminates the need for directory services, and allows the deployment of Tor-like networks in hostile environments, where centralised control is impossible. The proposed improvements concern the network organisation, but preserve the underlying onion routing mechanism that is at the base of Tor's anonymity.
机译:在冲突和其他重大事件(例如人口起义)中,获取信息至关重要。网络空间中越来越多的社会互动发生,而基础设施级别的信息交换(监视系统,传感器网络等)现在也基于Internet和无线链接,而不是临时的隔离有线网络。但是,Internet的性质允许强大的敌对行动者通过多种可用技术来阻止,审查或重定向与特定Internet服务之间的通信。诸如Tor之类的匿名网络为规避限制访问在线资源的传统策略提供了一种方法,并使通信更难追踪和识别。特别是在过去的危机中,Tor已成功用于规避审查制度和互联网封锁(2011年,埃及,2012年,伊朗)。匿名网络可以在冲突期间提供必要的通信工具,从而使信息交换对外部观察者隐蔽,匿名化,并能对施加的流量控制和地理限制具有弹性。但是,Tor等网络的设计使其容易受到大规模拒绝服务攻击,如2015年3月针对Tor隐藏服务的DDoS所示。在本文中,我们分析了Tor在拒绝服务方面的结构性弱点。服务攻击,并建议对Tor网络的结构进行许多修改,以提高其在冲突情况下对敌对行动者大规模协调进攻的抵抗力。特别是,我们引入了新颖的机制,允许中继信息以分布式和对等方式传播。这消除了对目录服务的需求,并允许在不可能进行集中控制的敌对环境中部署类似Tor的网络。拟议的改进涉及网络组织,但保留了基于Tor匿名的底层洋葱路由机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号