Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
نویسندگان
چکیده
There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract therefore difficult to generalize or even identify in real networks. While some papers distinct different attacker types, the usual approach is to present an anonymization technique and then to develop an attacker model for it in order to identify properties of the technique. Often such a model is abstract, unsystematic and it is not trivial to identify the exact threats for the end-user of the implemented system. This work follows another approach: we propose a classification of attacker types for the risk analysis and attacker modelling in anonymous communication independently of the concrete technique. The classes are designed in the way, that their meaning can be easily communicated to the end-users and management level. We claim that the use of this classification can lead to a more solid understanding of security provided by anonymizing networks, and therewith improve their development. Finally, we will classify some well known techniques and security issues according to the proposal and thus show the practical relevance and applicability of the proposed classification.
منابع مشابه
Anonymous Communication in Multi Hop Wireless Networks
In this paper we present a protocol for unlinkable and anonymous communication in multi hop wireless networks. There exist solutions for unlinkable communication in the internet, such as Tor and Mix networks. These protocols need fixed infrastructure and they are prone to traffic analysis attacks, i.e. where an attacker tries to map communicating devices by performing statistical analysis. Wire...
متن کاملAnonymity and Privacy in Electronic Services
This thesis presents information theoretic anonymity metrics and various analysis of anonymous communication nodes. Our contributions are a step towards the understanding of anonymity properties and the development of robust anonymous communications. Anonymous communications are an essential building block for privacy-enhanced applications, as the data available at the communication layer may l...
متن کاملA Hierarchical Anonymous Communication Protocol for Sensor Networks
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel hierarchical anonymous communication protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping ...
متن کاملA Stealthy Attack Against Tor Guard Selection
Tor is a popular low-latency anonymous communication system which could provide anonymity and anti-censorship. Based on previous researches on de-anonymization of Tor, this paper proposes a novel approach to attack users’ guard selection which can pose great threat against Tor users' anonymity. Under the current design of Tor, once entry guards are compromised, the probability that an attacker ...
متن کاملA Practical Buses Protocol for Anonymous Internet Communication
This paper describes the design, implementation, analysis, and evaluation of a Practical Buses protocol for anonymous network communication. The protocol, based on the metaphor of a city bus, provides connection anonymity for Internet-based communication. We modify the original Buses protocol from the literature to provide receiver anonymity, strengthen security, and improve efficiency and scal...
متن کامل