On Flow Correlation Attacks and Countermeasures in Mix Networks

نویسندگان

  • Ye Zhu
  • Xinwen Fu
  • Bryan Graham
  • Riccardo Bettati
  • Wei Zhao
چکیده

In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures that can defeat various traffic analysis attacks. In this paper, we focus on a particular class of traffic analysis attack, flow correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link at a mix with that over an output link of the same mix. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. Based on our threat model and known strategies in existing mix networks, we perform extensive experiments to analyze the performance of mixes. We find that a mix with any known batching strategy may fail against flow correlation attacks in the sense that for a given flow over an input link, the adversary can correctly determine which output link is used by the same flow. We also investigated methods that can effectively counter the flow correlation attack and other timing attacks. The empirical results provided in this paper give an indication to designers of Mix networks about appropriate configurations and alternative mechanisms to be used to counter flow correlation attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

Anomaly Protection Using Batching Strategies

Traffic analysis is typically countered by the use of intermediary nodes, whose role is to perturb the traffic flow and thus confuse an external observer. Such intermediaries are called mixes. We address attacks that exploit the timing behaviour of TCP and other protocols and applications in low-latency anonymity networks. Intermediaries delay and reroute exchanged messages, reorder them, pad t...

متن کامل

On the Effectiveness of Continuous-Time Mixes under Flow Correlation Attacks

ABSTRACT To achieve anonymity in open environments such as the Internet, special proxies, denoted as mixes, were proposed to relay messages for senders and receivers. A mix may delay, batch and reorder packets to disrupt the packet-level timing correlation of packets into and out of the mix. Often multiple mixes are grouped into a mix network, which preserves anonymity in presence of compromise...

متن کامل

Analysis of flow-correlation attacks in anonymity network

Mix networks are designed to provide anonymity for users in a variety of applications, including privacy-preserving WWW browsing and numerous e-commerce systems. Such networks have been shown to be susceptible to a number of statistical traffic analysis attacks. Among these are flow correlation attacks, where an adversary may disclose the communication relationship between a sender and a receiv...

متن کامل

A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks

For past few years, more interest has been focused on Wireless Sensor Networks (WSN) due to its wide range of applications in various fields. The WSNs are mainly used for sensing the pollution, monitoring the traffic; secure homeland, hospitals, military etc. There are possibilities of attacks in Wireless Sensor networks. Due to these attacks, there is possibility of loss of information. To avo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004