首页> 外文期刊>IEEE Transactions on Computers >Novel Packet Size-Based Covert Channel Attacks against Anonymizer
【24h】

Novel Packet Size-Based Covert Channel Attacks against Anonymizer

机译:基于新型数据包大小的隐蔽通道对匿名器的攻击

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial anonymous communication system. We discovered the architecture of Anonymizer and found that the size of web packets in the Anonymizer network can be very dynamic at the client. Motivated by this finding, we investigated a class of novel packet size-based covert channel attacks against Anonymizer. The attacker between a website and the Anonymizer server can manipulate the web packet size and embed secret signal symbols into the target traffic. An accomplice at the user side can sniff the traffic and recognize the secret signal. In this way, the anonymity provided by Anonymizer is compromised. We developed intelligent and robust algorithms to cope with the packet size distortion incurred by Anonymizer and Internet. We developed techniques to make the attack harder to detect: 1) We pick up right packets of web objects to manipulate to preserve the regularity of the TCP packet size dynamics, which can be measured by the Hurst parameter; 2) We adopt the Monte Carlo sampling technique to preserve the distribution of the web packet size despite manipulation. We have implemented the attack over Anonymizer and conducted extensive analytical and experimental evaluations. It is observed that the attack is highly efficient and requires only tens of packets to compromise the anonymous web surfing via Anonymizer. The experimental results are consistent with our theoretical analysis.
机译:在本文中,我们对著名的商业匿名通信系统Anonymizer的匿名性进行了研究。我们发现了Anonymizer的体系结构,并发现Anonymizer网络中Web数据包的大小在客户端可能非常动态。基于这一发现,我们研究了针对匿名器的一类基于数据包大小的新型隐蔽通道攻击。网站和Anonymizer服务器之间的攻击者可以操纵Web数据包的大小并将秘密信号符号嵌入目标流量中。用户端的帮凶可以监听流量并识别秘密信号。这样,匿名器提供的匿名性受到损害。我们开发了智能且强大的算法来应对Anonymizer和Internet引起的数据包大小失真。我们开发了使攻击更难检测的技术:1)拾取正确的Web对象数据包以进行操作以保留TCP数据包大小动态的规律性,该规律性可以通过Hurst参数进行测量; 2)我们采用了蒙特卡洛采样技术,尽管进行了操作,但仍保留了Web数据包大小的分布。我们已经实施了对Anonymizer的攻击,并进行了广泛的分析和实验评估。可以看出,该攻击非常高效,只需要数十个数据包即可破坏通过Anonymizer进行的匿名Web冲浪。实验结果与我们的理论分析一致。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号