首页> 外文期刊>Parallel and Distributed Systems, IEEE Transactions on >Correlation-Based Traffic Analysis Attacks on Anonymity Networks
【24h】

Correlation-Based Traffic Analysis Attacks on Anonymity Networks

机译:匿名网络上基于相关性的流量分析攻击

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures to defeat traffic analysis attacks. In this paper, we focus on a particular class of traffic analysis attacks, flow-correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link with that over an output link. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. Based on our threat model and known strategies in existing mix networks, we perform extensive experiments to analyze the performance of mixes. We find that all but a few batching strategies fail against flow-correlation attacks, allowing the adversary to either identify ingress and egress points of a flow or to reconstruct the path used by the flow. Counterintuitively, some batching strategies are actually detrimental against attacks. The empirical results provided in this paper give an indication to designers of Mix networks about appropriate configurations and mechanisms to be used to counter flow-correlation attacks.
机译:在本文中,我们解决了在低延迟匿名网络中利用TCP和其他协议及应用程序的定时行为的攻击。混合已在许多匿名通信系统中使用,并被认为可以提供对策,以击败流量分析攻击。在本文中,我们将重点放在一类特定的流量分析攻击上,即流量相关攻击,攻击者通过这种攻击尝试分析网络流量并将输入链路上的流量与输出链路上的流量相关联。考虑了两类相关方法,即时域方法和频域方法。基于我们的威胁模型和现有混合网络中的已知策略,我们进行了广泛的实验以分析混合的性能。我们发现,除少数几个批处理策略外,其他所有策略都无法抵抗流相关攻击,从而使对手可以识别流的入口和出口点,或重构流所使用的路径。与直觉相反,某些批处理策略实际上不利于攻击。本文提供的经验结果为Mix网络的设计者提供了有关用于应对流量相关攻击的适当配置和机制的指示。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号