Engineering Journal: Science and InnovationELECTRONIC SCIENCE AND ENGINEERING PUBLICATION
Certificate of Registration Media number Эл #ФС77-53688 of 17 April 2013. ISSN 2308-6033. DOI 10.18698/2308-6033
  • Русский
  • Английский
Article

The problem of traffic hiding in anonymous networks and the factors affecting anonymity

Published: 25.11.2014

Authors: Ershov N.G., Ryazanova N.Yu.

Published in issue: #12(36)/2014

DOI: 10.18698/2308-6033-2014-12-1331

Category: Information technology | Chapter: Information Security

The article considers the problems of the development of anonymous networks, allowing you to make contacts in the global network invisible to outside observers. All factors affecting the vulnerability of the anonymous network are classified: vulnerabilities that arise at the level of network nodes and at the level of messages sent over the network. It is shown that to ensure anonymity at the level of nodes in the network, it is necessary to hide the topology of the nodes to ensure network survivability and exclude substitution messages. Effectiveness of the strategy of mixing nodes to solve these problems is demonstrated. We analyzed currently known schemes of violating anonymity networks and types of attacks on anonymous networks. We show how anonymity can be violated when intercepting the message at the intermediate node, when identifying the communication template of the network, analyzing the message transmission time. On the basis of the conducted researches we formulated extended requirements for the implementation and development of anonymous networks.


References
[1] Chaum D. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 1981, no. 2 (24), pp. 84-90.
[2] Raymond J. Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems. Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, 2001, pp. 10-29.
[3] Rennhard M., Rafaeli S., Mathy L. Design, Implementation and Analysis of an Anonymity Network for Web Browsing. Technical Report, 2002, no. 129, 17 p.
[4] Bhatia S., Motiwala M., Valancius V. Hosting Virtual Networks on Commodity Hardware. Available at: http://www.cs.princeton.edu/~jrex/papers/trellis07.pdf (accessed on 16.11.2014).
[5] Rennhard M., Rafaeli S., Mathy L. Architecture for an Anonymity Network. Enabling Technologies: Infrastructure for Collaborative Enterprises, 2001, pp. 165-170.
[6] Berthold O., Standtke R., Pfitzmann A. The Disadvantages of free MIX routes and how to overcome them. International workshop on Designing privacy enhancing technologies, New York, 2001, pp. 30-45.
[7] Rannenberg K., Iachello G. Protection Profiles for Remailer Mixes. Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, 2009, pp. 181-230.
[8] Goldschlag D., Reed M., Syverson P. Hiding Routing Information. Workshop on Information Hiding, Cambridge, 1996, 14 p.
[9] Danezis G., Mix-Networks with Restricted Routes. Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, 2003, pp. 1-17.
[10] Seijantov A., Danezis G. Towards an Information Theoretic Metric for Anonymity. Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, 2003, pp. 41-53.
[11] Chaum D.L. The Dining Cryptographers Problem: Unconditional Sender and Receiver Untraceability. Journal of Cryptology, 1988, no. 1 (1), рр. 66-75.
[12] Berthold O., Federrath H., Kopsell S. WebMIXes: A System for Anonymous and Unobservable Internet Access. Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, 2009, pp. 115-129.
[13] Syverson P., Tsudik G., Reed M., Landwehr C. Towards an Analysis of Onion Routing Security. Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, 2009, pp. 96-114.
[14] Wiangsripanawan R., Susilo W., Safavi-Naini R. Design Principles for Low Latency Anonymous Network Systems Secure Against Timing Attacks. Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, 2007, no. 68, pp. 183-191.
[15] Tor. Anonymity Online. Available at: https://www.torproject.org/index.html.en (accessed on 22.06.2014).