【24h】

How Much Anonymity does Network Latency Leak?

机译:网络延迟泄漏多少匿名性?

获取原文

摘要

Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by "local" adversaries who control only a few machines, and have low enough delay to support anonymous use of network services like web browsing and remote login. One consequence of these goals is that these services leak some information about the network latency between the sender and one or more nodes in the system. This paper reports on three experiments that partially measure the extent to which such leakage can compromise anonymity. First, using a public dataset of pairwise roundtrip times (RTTs) between 2000 Internet hosts, we estimate that on average, knowing the network location of host A and the RTT to host B leaks 3.64bits of information about the network location of B. Second, we describe an attack that allows a pair of colluding web sites to predict, based on local timing information and with no additional resources, whether two connections from the same Tor exit node are using the same circuit with 17% equal error rate. Finally, we describe an attack that allows a malicious website, with access to a network coordinate system and one corrupted Tor router, to recover roughly 6.8bits of network location per hour.
机译:诸如Tor,An.on,Crowds和Anonymizer.com的低延迟匿名系统旨在提供匿名联系,这些连接既不能控制少数机器的“本地”对手,并且具有足够低的延迟以支持匿名使用网络服务,如Web浏览和远程登录。这些目标的后果是,这些服务泄漏了关于发件人之间的网络延迟和系统中的一个或多个节点之间的网络延迟的一些信息。本文有关三个实验报告,部分衡量这种泄漏可能会损害匿名的程度。首先,在2000年互联网主机之间使用成对往返时间(RTTS)的公共数据集,我们估计平均而言,知道主机A的网络位置A和RTT到主机B泄漏3.64位有关B的网络位置的3.64位信息,我们描述了一种允许基于本地定时信息和没有额外资源的耦合网站来预测的攻击,并且没有附加资源,是否来自相同的TOR出口节点的两个连接是使用具有17%相等差错率的相同电路。最后,我们描述了一种允许恶意网站的攻击,可以访问网络坐标系和一个损坏的Tor路由器,每小时恢复大约6.8英寸的网络位置。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号