Tempest: Temporal Dynamics in Anonymity Systems

نویسندگان

  • Ryan Wails
  • Yixin Sun
  • Aaron Johnson
  • Mung Chiang
  • Prateek Mittal
چکیده

Many recent proposals for anonymous communication omit from their security analyses a consideration of the effects of time on important system components. In practice, many components of anonymity systems, such as the client location and network structure, exhibit changes and patterns over time. In this paper, we focus on the effect of such temporal dynamics on the security of anonymity networks. We present Tempest, a suite of novel attacks based on (1) client mobility, (2) usage patterns, and (3) changes in the underlying network routing. Using experimental analysis on real-world datasets, we demonstrate that these temporal attacks degrade user privacy across a wide range of anonymity networks, including deployed systems such as Tor; pathselection protocols for Tor such as DeNASA, TAPS, and Counter-RAPTOR; and network-layer anonymity protocols for Internet routing such as Dovetail and HORNET. The degradation is in some cases surprisingly severe. For example, a single host failure or network route change could quickly and with high certainty identify the client’s ISP to a malicious host or ISP. The adversary behind each attack is relatively weak — generally passive and in control of one network location or a small number of hosts. Our findings suggest that designers of anonymity systems should rigorously consider the impact of temporal dynamics when analyzing anonymity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust noise attenuation under stochastic noises and worst-case unmodelled dynamics

Robust noise attenuation under stochastic noises and worst-case unmodelled dynamics Araz Hashemi, Ben Fitzpatrick, Le Yi Wang & George Yin a Department of Mathematics, Wayne State University, Detroit, MI, USA b Department of Mathematics, Loyola Marymount University, Los Angeles, CA, USA c Tempest Technologies, Los Angeles, CA, USA d Department of Electrical and Computer Engineering, Wayne State...

متن کامل

Exploring the temporal structure of heterochronous sequences using TempEst (formerly Path-O-Gen)

Gene sequences sampled at different points in time can be used to infer molecular phylogenies on a natural timescale of months or years, provided that the sequences in question undergo measurable amounts of evolutionary change between sampling times. Data sets with this property are termed heterochronous and have become increasingly common in several fields of biology, most notably the molecula...

متن کامل

Mission-Level Path Planning for Rover Exploration

We present TEMPEST, an autonomous, energy-cognizant planner for long-range rover navigation. Its purpose is to plan sequences of actions that avoid large-scale obstacles, balance energy expenses against available resources, and satisfy operational constraints while attaining a distant goal. An algorithm called Incremental Search Engine (ISE) enables TEMPEST to search over high-dimensional space...

متن کامل

Group Dynamics and Pedagogy in Online Groups

A range of online learning environments now offers asynchronous discussion groups to facilitate student interaction with teachers and peers. Features, such as anonymity and delegated leadership offer new possibilities for learning processes. Few teachers and students are prepared for the processes that arise when the temporal dynamic and status relationships of the classroom are changed. Some b...

متن کامل

A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks

Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a dest...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1801.01932  شماره 

صفحات  -

تاریخ انتشار 2018