Проблемы сокрытия трафика в анонимной сети и факторы, влияющие на анонимность - page 8

Н.Г. Ершов, Н.Ю. Рязанова
8
The problem of traffic hiding
in anonymous networks and the factors affecting anonymity
©
N.G. Yershov, N.Y. Ryazanova
Bauman Moscow State Technical University, Moscow, 105005, Russia
The article considers the problems of the development of anonymous networks, allowing
you to make contacts in the global network invisible to outside observers. All factors af-
fecting the vulnerability of the anonymous network are classified: vulnerabilities that
arise at the level of network nodes and at the level of messages sent over the network. It
is shown that to ensure anonymity at the level of nodes in the network, it is necessary to
hide the topology of the nodes to ensure network survivability and exclude substitution
messages. Effectiveness of the strategy of mixing nodes to solve these problems is demon-
strated. We analyzed currently known schemes of violating anonymity networks and types
of attacks on anonymous networks. We show how anonymity can be violated when inter-
cepting the message at the intermediate node, when identifying the communication tem-
plate of the network, analyzing the message transmission time. On the basis of the con-
ducted researches we formulated extended requirements for the implementation and
development of anonymous networks.
Keywords:
network, node, message, anonymous network, anonymous site, network at-
tack, mixing nodes.
REFERENCES
[1]
Chaum D. Untraceable Electronic Mail, Return Addresses, and Digital Pseudo-
nyms
. Communications of the ACM
, 1981, no. 2 (24), рр. 84–90.
[2]
Raymond J. Traffic Analysis: Protocols, Attacks, Design Issues and Open Prob-
lems.
Designing Privacy Enhancing Technologies. Lecture Notes in Computer
Science
, 2001, pp. 10–29.
[3]
Rennhard M., Rafaeli S., Mathy L. Design, Implementation and Analysis of an
Anonymity Network for Web Browsing.
Technical Report
, 2002, no. 129, 17 p.
[4]
Bhatia S., Motiwala M., Valancius V.
Hosting Virtual Networks on Commodity
Hardware
. Available at:
(accessed on 16.11.2014).
[5]
Rennhard M., Rafaeli S., Mathy L. Architecture for an Anonymity Network.
Enabling Technologies: Infrastructure for Collaborative Enterprises
, 2001,
pp. 165–170.
[6]
Berthold O., Standtke R., Pfitzmann A. The Disadvantages of free MIX routes
and how to overcome them.
International workshop on Designing privacy en-
hancing technologies
, New York, 2001, pp. 30–45.
[7]
Rannenberg K., Iachello G. Protection Profiles for Remailer Mixes.
Designing
Privacy Enhancing Technologies. Lecture Notes in Computer Science
, 2009,
pp. 181–230.
[8]
Goldschlag D., Reed M., Syverson P. Hiding Routing Information.
Workshop
on Information Hiding
, Cambridge, 1996, 14 р.
[9]
Danezis G., Mix-Networks with Restricted Routes.
Designing Privacy Enhanc-
ing Technologies. Lecture Notes in Computer Science,
2003, pp. 1–17.
[10]
Serjantov A., Danezis G. Towards an Information Theoretic Metric for Ano-
nymity.
Proceedings of the 2nd International Conference on Privacy Enhancing
Technologies,
2003, pp. 41–53.
1,2,3,4,5,6,7 9
Powered by FlippingBook