Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Analysis of Flow Correlation Attacks in Anonymity Networks against Passive Logging Attacks


Affiliations
1 Department of Computer Science and Engineering, K.S.R. College of Engineering, Tiruchengode, Tamil Nadu, India
     

   Subscribe/Renew Journal


In this paper, we focus on a particular class of traffic analysis attacks, flow- correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link with that over an output link. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. We address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks. Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are the ways as they are used to deploy anonymity measures, and finally the possible attack methods. Mixes have been used in many anonymous communication systems and are used to provide countermeasures to defeat traffic analysis attacks. But we find that only a few batching strategies fail against flow-correlation attacks, allowing the adversary to either identify ingress and egress points of a flow or to reconstruct the path used by the flow. Similarly, some batching strategies are actually detrimental against attack`s. Based on our threat model and known strategies in existing mix networks, we perform extensive experiments to analyze the performance of mixes. Results provided in this paper give an indication to designers of Mix networks. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis.

Keywords

Privacy, Mixes, Anonymity, Anonymous Communication, Flow-Correlation Attack.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 268

PDF Views: 1




  • Analysis of Flow Correlation Attacks in Anonymity Networks against Passive Logging Attacks

Abstract Views: 268  |  PDF Views: 1

Authors

S. G. Shahidha Taj
Department of Computer Science and Engineering, K.S.R. College of Engineering, Tiruchengode, Tamil Nadu, India

Abstract


In this paper, we focus on a particular class of traffic analysis attacks, flow- correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link with that over an output link. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. We address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks. Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are the ways as they are used to deploy anonymity measures, and finally the possible attack methods. Mixes have been used in many anonymous communication systems and are used to provide countermeasures to defeat traffic analysis attacks. But we find that only a few batching strategies fail against flow-correlation attacks, allowing the adversary to either identify ingress and egress points of a flow or to reconstruct the path used by the flow. Similarly, some batching strategies are actually detrimental against attack`s. Based on our threat model and known strategies in existing mix networks, we perform extensive experiments to analyze the performance of mixes. Results provided in this paper give an indication to designers of Mix networks. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis.

Keywords


Privacy, Mixes, Anonymity, Anonymous Communication, Flow-Correlation Attack.