vpwns: Virtual Pwned Networks

نویسندگان

  • Marsh Ray
  • Jacob Appelbaum
  • Karl Koscher
  • Ian Finder
چکیده

User-accessed Virtual Private Network systems allow authorized users remote access to protected or otherwise privileged networks while avoiding dependence on ISPs along the route for data confidentiality and integrity. This direct expression of the internet’s end-to-end principle of security is generally accepted as a highly successful design. VPN services and technology advertising censorship circumvention, resistance to data retention, and anonymity as features are proliferating rapidly. But it is unclear that these security properties were included in the original design requirements of VPN protocols and product implementations. Experience with dedicated anonymity networks (e.g., Tor) shows that strong anonymity is not achieved by accident. The ‘P’ in VPN notwithstanding, not all privacy methods are equal or strongly anonymizing, which opens opportunities for attackers when VPN-based systems are used for anonymity or even simple censorship circumvention. This paper evaluates VPN anonymity, security and privacy features including identity, geographic location, confidentiality of communications, and generalized security issues such as reachability and prevention of network tampering. We find many popular VPN products are susceptible to a variety of practical user deanonymization attacks. Weaknesses stem from lack of security analysis of the composition of VPNs, applications, and the TCP/IP stack on each respective operating system. Although we describe some potential mitigations for vendors, the primary goal of this paper is to raise awareness of the inherent risks which come from repurposing off-the-shelf VPN systems to provide strong anonymity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling Structural Relationships of Meta-Cognitive Situations with Tendency to Virtual Networks through Mediating of Emotional Processing in Gifted Students

Background: Cyberspace covers many aspects of human life and tendency to cyberspace can be influenced by cognitive and emotional dimensions. Thus, the aim of this study was modeling structural relationships of meta-cognitive situations with tendency for virtual networks through mediating emotional processing in gifted students. Methods: The research method was descriptive-correlation and in pa...

متن کامل

The Prediction Dependency on Virtual Social Networks Based on Alexithymia, Attachment Styles, Well-Being Psychological and Loneliness

Introduction: Virtual social networks like others type of addiction can be affected by psychological, developmental, and emotional problems. So, the aim of this research is to The purpose of this study was to investigate prediction dependency on virtual social networks based on alexithymia, attachment styles, well-being psychological and loneliness. The research design was a two-group diagnosti...

متن کامل

The role of Membership and Participation in Admissible Virtual Social Networks on Cultural Convergence (Case study: the Young Members of FACE NAMA in Qom)

The appearance of different social media has been very influential in individuals’ life. The most common social networks are virtual social networks which have been fascinated by many users because of a lot of similarities with human society, and communications and interactions which are formed in it. This study investigates the role of membership and participation in virtual social network on ...

متن کامل

The Relationship between Spiritual Health and Use of Virtual Social Networks in High-School Students of Firozabad, Fars Province

Introduction: In different societies, paying attention to spiritual dimension of health has been emphasized as one of the health dimensions according to the WHO. The study aimed to determine the relation between spiritual health and use of virtual social networks among high school students in Firouzabad, Fars province in 2017. Methods: In the cross-sectional study, 380 students (16-18 years) w...

متن کامل

The Role of Cognitive Emotion Regulation Strategies and Early Maladaptive Schemas in the Use of Virtual Social Networks among Female Students

This study was undertaken to determine the role of cognitive emotion regulation strategies and early maladaptive schemas in the use of virtual social networks among female students. In this correlational study, 398 Tehrani high school girls were selected during 2018-19 school year via Krejcie & Morgan table and stratified sampling method. The instruments included the Virtual Social Networks Use...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012