Network Level Attacks and Defenses Against Anonymity Networks
Tan, Zhi Da Henry
Online anonymous communication is an important service used by individuals, journalists, government agencies and law enforcement agencies.One of the most popular uses of online anonymity is web browsing which necessitates using a low latency anonymity system. Unfortunately, these systems are typically vulnerable to the correlation attack, where an adversary that can observe the parts of a client’s flow that enter and leave the system, can deanonymize the client.Recent research has shown that network layer adversaries pose far greater threat to anonymity systems than previously thought. By manipulating the Internet’s control-plane, i.e., BGP, an adversary can increase its view of the network and improve its ability to deanonymize clients.In this dissertation, we study in depth these network level adversaries, attacks against BGP and their effects on the security of Tor. We propose and evaluate defenses against these attacks.In order to evaluate the aforementioned threats, we construct accurate models of the Internet. Our models preserve important details of the Tor network, such as end to end latency and path of Autonomous Systems, of network routes.Using these highly granular models, we emulate a scaled down version of the Tor network. Our emulations allow us to examine the performance of Tor and potential compromise due to an AS adversary under different relay selection strategies.Using an AS level model, we explore the effects of control-plane attacks on the security of Tor. We quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable, and the advantage the adversary attains by performing the attacks. We show that 13% of Tor’s ingress bandwidth, at the median, is susceptible to an adversary which hijacks six prefixes.We propose defense mechanisms to protect Tor users from manipulation at the control-plane. Our defenses require low overhead, do not assume the active participation of Internet Service Providers, and require small changes to Tor. We experimentally evaluate the effectiveness of our defenses, and show that they result in a more than tenfold decrease in the effectiveness of the control-plane attacks, preventing the attack entirely from many ASes.
MetadataShow full item record
Showing items related by title, author, creator and subject.
Unknown author (1990-04)
Being a Child of Donor Insemination: Organisations Are Committed to Increasing Available Information; Donor Conception Network Always Advises Openness; Consultation Is in Progress About Whether to Persist With Donor Anonymity Blyth, Eric D.; Montuschi, Olivia; Wray, Gwyneth (2002-06-01)
Immunity from liability; actions against parents on childbirth claims; defenses and damages in third party actions California. Laws, Statutes (1982)