AS 0 AS 1 AS 2 AS 3 AS 5 AS 4 Internet

نویسنده

  • Adrian Perrig
چکیده

We identify two vulnerabilities for existing highspeed network-layer anonymity protocols, such as LAP and Dovetail. First, the header formats of LAP and Dovetail leak path information, reducing the anonymity-set size when an adversary launches topological attacks. Second, ASes can launch session hijacking attacks to deanonymize destinations. HORNET addresses these problems but incurs additional bandwidth overhead and latency. In this paper, we propose PHI, a Path-HIdden lightweight anonymity protocol that solves both challenges while maintaining the same level of efficiency as LAP and Dovetail. We present an efficient packet header format that hides path information and a new back-off setup method that is compatible with current and future network architectures. Our experiments demonstrate that PHI expands anonymity sets of LAP and Dovetail by over 30x and reaches 120 Gbps forwarding speed on a commodity software router.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Graption: A graph-based P2P traffic classification framework for the internet backbone

1 The authors thank CAIDA for providing this set of traffic traces. Additional information for these traces can be found in the DatCat, Internet Measurement Data Catalog [8], indexed under the label ‘‘PAIX’’. 1910 M. Iliofotou et al. / Computer Networks 55 (2011) 1909–1920 behavior. Flow-level and payload-based classification methods require per application training and will thus not detect P2P...

متن کامل

اعتیاد به اینترنت: اختلالی نو در نسخه‌ی آتی راهنمای تشخیصی و آماری اختلالات روانی

Internet addiction known as a behavioral dependence and the inability to control impulses associated with the use of the Internet, although in 1996, and perhaps earlier, was described, until the publication of the fifth edition of the Diagnostic and Statistical Manual of mental disorders in 2013, wasn’t a disorder with formal diagnostic criteria. Putting the internet addiction in third se...

متن کامل

Prioritizing the Importance of SMS Advertising and Virtual Advertising in CustomersAttraction in Sports Venues of Mazandaran Province

 The aim of this study was to investigate the role of SMS advertising and virtual advertising in attracting customers in sports centers of Mazandaran province. The research method was descriptive and correlational and conducted by the field study method. The statistical population was all people who referred to sports facilities in Mazandaran province. With regard to the unlimited number of com...

متن کامل

Identification in Cyberspace as a Main Challenge of e-Government (A Legal Approach to e-Identity Management System)

The penetration and growth of the Internet, as a key technology of the 21st century, caused to some major changes in all individual and social aspects of human life. Some of these changes, which associated with the evolution and changes in the concepts, including legal and political ones, have become a challenge. Identity as a legal and Government as a political concepts are in those fields whi...

متن کامل

Is Internet-Speed Software Development Different?

0 7 4 0 7 4 5 9 / 0 3 / $ 1 7 . 0 0 © 2 0 0 3 I E E E Current software development methods and software process improvement approaches (ISO 9000, Capability Maturity Models, SPICE, and BOOTSTRAP, for example) are typically effective in large-scale, long-term development efforts with stable and disciplined processes.1 In contrast, Internet-speed software development involves rapid requirement ch...

متن کامل

Cyberloafing Management in Organizations

Entering into the third millennium and current information age, organizations andpeople are increasingly using technologies and networks. In recent decades,technological progresses have rapidly dominated the world. In this vein, theemergence of the Internet in different aspects of life is considered to be the greatestdevelopment of the 21st century. The Internet, along with technologicaladvance...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016