SlideShare a Scribd company logo
1 of 14
Download to read offline
Anonymizing Networks



                                         Peng Deng
                pdeng@students.csse.unimelb.edu.au
                                         ∑ SUM Lab
                      CSSE University of Melbourne
Agenda
• Introduction
   – Background
   – Threats
   – Taxonomy

• Different Approaches
   – Centralized approaches
      • Proxy
      • Crowds
   – Distributed approaches
      • Classical MIX
      • Tor
      • Tarzan

• Comparison and Conclusion


                                  2
Background
•   Internet was designed with accountability in mind



•   Anonymous network can be used to:
     –   Support free of speech
     –   Censorship resistant communication
     –   Preserve privacy                      -Identification: Identifies the current datagram
                                               -Time-to-Live: Fingerprint of OS
     –   Distribute materials
                                               -Source Address
                                               -Destination Address
                                               -Port Number

•   Encryption is not enough to preserve privacy
     – Encryption can only hide the content of message
     – Both initiator and receiver’s anonymity should be preserved



                                                                                                  3
Threats
         Threats                         Prevent Methods
Message coding attack   Re-encrypting message when transmitting packets
Message length attack   between nodes, padding

Replay attack           Maintain a temporary database to record processed
                        packet
Collusion attack        More intermediate nodes in network
Flooding attack         P2P network is preferred rather than centralized
                        services
Message volume attack   Network width traffic analysis, hard to prevent
Timing attack
Profiling attack




                                                                           4
Taxonomy
                                             High latency   Low latency


                        Central              Email relay    Web proxy
                        Distributed and      N/A            MIX
                        Pseudo-distributed



•Central/High latency: anon.penet.fi and MixMaster

•Central/Low latency: Anonymizer and SafeWeb

•Pseudo-Distributed/High Latency and Distributed/High Latency: N/A

•Pseudo-Distributed/Low Latency and Distributed/Low latency : Tor, Tarzan and MorphMix




                                                                                         5
Centralized approaches
Proxy:

    •Proxy reveals identity                             SSL
    •Adversary blocks access to proxy (DoS)    Client         Proxy   Web server




                                                        SSL
    •Traffic analysis is easy                  Client         Proxy   Web server




    •Adversary blocks connections from proxy            SSL

                                               Client         Proxy   Web server
Example services are:
•Anonymizer
•SafeWeb
                                                                                   6
Centralized approaches cont.
Crowds:            Registration
                     Server       1
                                           2

                       5
                                                Destination
                                       3          Server

                                  4   Crowd

1. Register to server and retrieve network topology information

2. Server updates new topology information to every node

3. Initiator sends packet to another randomly selected node

4. The node randomly decides relay the packet again or send out
                                                                  7
Distributed approaches
Chaum’s MIX network:




                                       Nxt
                          Nxt
                          adr
                                Nxt
                                adr
                                        adr    Real Payload
                                      (True)



•Layered encryption
•Node can only know its successor and predecessor
•Packet padding and cover traffic can be applied

                                                              8
Distributed approaches cont.
The Onion Router: (Pseudo-distributed)
     Alice’s
     Computer
                                         OR2
   App1     App2
                                     1
                                                       2     2
                               OR1
                       1
        LP                                         1
                                                             OR3       WS2
                           2
                                               2
                                 OR7                       OR6
   Directory Service                                               1   WS1




•MIX encoding creates encrypted tunnel of relays
•Packet forwarding through tunnel
•Small-scale, static network

+ Individual malicious relays cannot reveal identity
-Adversary targets core routers and directory server
-Network-edge analysis still exists
-Scalability is a problem                                                    9
Distributed approaches cont.
     The Onion Router’s Hidden Service
     + Provide anonymity service            3                                            2
     -- Within TOR network only                              Database

                                                                             4

                                                4
                                                                                     1
                                                        IP              IP
                                                                             1
                                    Alice
                                                5                                            Hidden server

                                                        RP

                                                    6                            5
1.   Server picks some introduction points and build circuits to them
2.   Server advertises his hidden service “XYZ.onion” at the DB
3.   Alice hears “XYZ.onion” exists, and she requests information from DB
4.   Alice writes a message with rendezvous point to hidden server through introduction point
5.   Alice and hidden server validate one-time secret in rendezvous point
6.   Tor circuits established between Alice and hidden server
                                                                                                       10
Distributed approaches cont.
  Tarzan and MorphMix: (Distributed)


                                                             PNAT




•No distinction between anon proxies and clients
          Peer-to-peer model
•Anonymity against corrupt relays
          MIX-net encoding
          Robust tunnel selection
          Prevent adversary spoofing or running many nodes
•Anonymity against global eavesdropping
          Cover traffic protects all edges
          Restrict topology to make cover practical
          Choose neighbors in verifiably-random manner
•Application-independence
          Low-latency IP-layer redirection
                                                                11
Distributed approaches cont.
Tarzan and MorphMix: (Distributed)


•Join the system
1. Contacts known peers to learn neighbor lists              PNAT
2. Validates each peer by directly ping

•Cover the traffic within mimics
     1. Nodes send at some traffic rate per time period
     2. Traffic rate independent of actual demand
     3. All packets are same length and link encrypted
     + Reduce the network overhead

•Peer selection
Assumption: Adversary nodes are mostly in same IP area
Method: Randomly select IP address in different subnet

The path of communication is not defined by initiator but
choose by intermediate nodes in MorphMix.
                                                            12
Comparison and Conclusion
                  Anonymizer   Tor   Tarzan

 S. anon. to R.                       ☺
 R. anon. to S.                ☺
  Scalability                         ☺
   Usability         ☺
  Popularity         ☺         ☺


                                              13
Thank you

                                 Peng Deng
                             MEDC Student
                        SUM Research Lab
              CSSE University of Melbourne
        pdeng@students.csse.unimelb.edu.au
                    Monday, May 19, 2008
                                         14

More Related Content

What's hot

Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricBangladesh Network Operators Group
 
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionAPNIC
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018CodeOn
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Toolncct
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AAKASH S
 
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PROIDEA
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...ijdpsjournal
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)btpsec
 
How You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from NowHow You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from Nowjulievreeland
 
On her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyOn her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyStephen Kho
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameJaime Sánchez
 
From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13Jaime Sánchez
 
Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolMehedi
 
Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!stricaud
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 

What's hot (20)

Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
 
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and Discussion
 
Exploiting Layer 2
Exploiting Layer 2Exploiting Layer 2
Exploiting Layer 2
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018
 
Preventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP addressPreventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP address
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
 
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
 
How You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from NowHow You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from Now
 
On her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyOn her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy Agency
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse game
 
From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13
 
Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocol
 
Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Duan
DuanDuan
Duan
 

Similar to Anonymous Network

Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?RIPE NCC
 
CNIT 124: Ch 7: Capturing Traffic
CNIT 124: Ch 7: Capturing TrafficCNIT 124: Ch 7: Capturing Traffic
CNIT 124: Ch 7: Capturing TrafficSam Bowne
 
Spying The Wire
Spying The WireSpying The Wire
Spying The WireDon Anto
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminskyDan Kaminsky
 
Apcon launch sequence highlights
Apcon launch sequence highlightsApcon launch sequence highlights
Apcon launch sequence highlightsChelseaTenfold
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsBiagio Botticelli
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabusVinay Kumar C
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LANArpit Suthar
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
 
communication system l2
communication system l2communication system l2
communication system l2MR Z
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn FortinetDigicomp Academy AG
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoDigicomp Academy AG
 

Similar to Anonymous Network (20)

Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
CNIT 124: Ch 7: Capturing Traffic
CNIT 124: Ch 7: Capturing TrafficCNIT 124: Ch 7: Capturing Traffic
CNIT 124: Ch 7: Capturing Traffic
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
 
Rumor riding
Rumor ridingRumor riding
Rumor riding
 
Apcon launch sequence highlights
Apcon launch sequence highlightsApcon launch sequence highlights
Apcon launch sequence highlights
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabus
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
03. osi reference-layer
03. osi reference-layer03. osi reference-layer
03. osi reference-layer
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
communication system l2
communication system l2communication system l2
communication system l2
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live Demo
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
 
The Onion Routing (TOR)
The Onion Routing (TOR)The Onion Routing (TOR)
The Onion Routing (TOR)
 

More from pauldeng

Toy robot simulator
Toy robot simulatorToy robot simulator
Toy robot simulatorpauldeng
 
Deng Peng document template
Deng Peng document templateDeng Peng document template
Deng Peng document templatepauldeng
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real Worldpauldeng
 
Scaling a Rich Client to Half a Billion Users
Scaling a Rich Client to Half a Billion UsersScaling a Rich Client to Half a Billion Users
Scaling a Rich Client to Half a Billion Userspauldeng
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overviewpauldeng
 
无线识别技术
无线识别技术无线识别技术
无线识别技术pauldeng
 
Issnip Presentation
Issnip PresentationIssnip Presentation
Issnip Presentationpauldeng
 
6 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 200802066 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 20080206pauldeng
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real Worldpauldeng
 
Acceleration Based Hci Prototype
Acceleration Based Hci PrototypeAcceleration Based Hci Prototype
Acceleration Based Hci Prototypepauldeng
 
Sunspot Final
Sunspot FinalSunspot Final
Sunspot Finalpauldeng
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networkspauldeng
 
IDEA Lab Presentation
IDEA Lab PresentationIDEA Lab Presentation
IDEA Lab Presentationpauldeng
 
Introduction To SPOT
Introduction To SPOTIntroduction To SPOT
Introduction To SPOTpauldeng
 

More from pauldeng (19)

Toy robot simulator
Toy robot simulatorToy robot simulator
Toy robot simulator
 
Deng Peng document template
Deng Peng document templateDeng Peng document template
Deng Peng document template
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real World
 
V We
V WeV We
V We
 
Final
FinalFinal
Final
 
Scaling a Rich Client to Half a Billion Users
Scaling a Rich Client to Half a Billion UsersScaling a Rich Client to Half a Billion Users
Scaling a Rich Client to Half a Billion Users
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overview
 
无线识别技术
无线识别技术无线识别技术
无线识别技术
 
Issnip Presentation
Issnip PresentationIssnip Presentation
Issnip Presentation
 
6 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 200802066 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 20080206
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real World
 
Acceleration Based Hci Prototype
Acceleration Based Hci PrototypeAcceleration Based Hci Prototype
Acceleration Based Hci Prototype
 
Sunspot Final
Sunspot FinalSunspot Final
Sunspot Final
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networks
 
Idea Lab
Idea LabIdea Lab
Idea Lab
 
IDEA Lab Presentation
IDEA Lab PresentationIDEA Lab Presentation
IDEA Lab Presentation
 
Sunspot
SunspotSunspot
Sunspot
 
Sunspot
SunspotSunspot
Sunspot
 
Introduction To SPOT
Introduction To SPOTIntroduction To SPOT
Introduction To SPOT
 

Recently uploaded

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Anonymous Network

  • 1. Anonymizing Networks Peng Deng pdeng@students.csse.unimelb.edu.au ∑ SUM Lab CSSE University of Melbourne
  • 2. Agenda • Introduction – Background – Threats – Taxonomy • Different Approaches – Centralized approaches • Proxy • Crowds – Distributed approaches • Classical MIX • Tor • Tarzan • Comparison and Conclusion 2
  • 3. Background • Internet was designed with accountability in mind • Anonymous network can be used to: – Support free of speech – Censorship resistant communication – Preserve privacy -Identification: Identifies the current datagram -Time-to-Live: Fingerprint of OS – Distribute materials -Source Address -Destination Address -Port Number • Encryption is not enough to preserve privacy – Encryption can only hide the content of message – Both initiator and receiver’s anonymity should be preserved 3
  • 4. Threats Threats Prevent Methods Message coding attack Re-encrypting message when transmitting packets Message length attack between nodes, padding Replay attack Maintain a temporary database to record processed packet Collusion attack More intermediate nodes in network Flooding attack P2P network is preferred rather than centralized services Message volume attack Network width traffic analysis, hard to prevent Timing attack Profiling attack 4
  • 5. Taxonomy High latency Low latency Central Email relay Web proxy Distributed and N/A MIX Pseudo-distributed •Central/High latency: anon.penet.fi and MixMaster •Central/Low latency: Anonymizer and SafeWeb •Pseudo-Distributed/High Latency and Distributed/High Latency: N/A •Pseudo-Distributed/Low Latency and Distributed/Low latency : Tor, Tarzan and MorphMix 5
  • 6. Centralized approaches Proxy: •Proxy reveals identity SSL •Adversary blocks access to proxy (DoS) Client Proxy Web server SSL •Traffic analysis is easy Client Proxy Web server •Adversary blocks connections from proxy SSL Client Proxy Web server Example services are: •Anonymizer •SafeWeb 6
  • 7. Centralized approaches cont. Crowds: Registration Server 1 2 5 Destination 3 Server 4 Crowd 1. Register to server and retrieve network topology information 2. Server updates new topology information to every node 3. Initiator sends packet to another randomly selected node 4. The node randomly decides relay the packet again or send out 7
  • 8. Distributed approaches Chaum’s MIX network: Nxt Nxt adr Nxt adr adr Real Payload (True) •Layered encryption •Node can only know its successor and predecessor •Packet padding and cover traffic can be applied 8
  • 9. Distributed approaches cont. The Onion Router: (Pseudo-distributed) Alice’s Computer OR2 App1 App2 1 2 2 OR1 1 LP 1 OR3 WS2 2 2 OR7 OR6 Directory Service 1 WS1 •MIX encoding creates encrypted tunnel of relays •Packet forwarding through tunnel •Small-scale, static network + Individual malicious relays cannot reveal identity -Adversary targets core routers and directory server -Network-edge analysis still exists -Scalability is a problem 9
  • 10. Distributed approaches cont. The Onion Router’s Hidden Service + Provide anonymity service 3 2 -- Within TOR network only Database 4 4 1 IP IP 1 Alice 5 Hidden server RP 6 5 1. Server picks some introduction points and build circuits to them 2. Server advertises his hidden service “XYZ.onion” at the DB 3. Alice hears “XYZ.onion” exists, and she requests information from DB 4. Alice writes a message with rendezvous point to hidden server through introduction point 5. Alice and hidden server validate one-time secret in rendezvous point 6. Tor circuits established between Alice and hidden server 10
  • 11. Distributed approaches cont. Tarzan and MorphMix: (Distributed) PNAT •No distinction between anon proxies and clients Peer-to-peer model •Anonymity against corrupt relays MIX-net encoding Robust tunnel selection Prevent adversary spoofing or running many nodes •Anonymity against global eavesdropping Cover traffic protects all edges Restrict topology to make cover practical Choose neighbors in verifiably-random manner •Application-independence Low-latency IP-layer redirection 11
  • 12. Distributed approaches cont. Tarzan and MorphMix: (Distributed) •Join the system 1. Contacts known peers to learn neighbor lists PNAT 2. Validates each peer by directly ping •Cover the traffic within mimics 1. Nodes send at some traffic rate per time period 2. Traffic rate independent of actual demand 3. All packets are same length and link encrypted + Reduce the network overhead •Peer selection Assumption: Adversary nodes are mostly in same IP area Method: Randomly select IP address in different subnet The path of communication is not defined by initiator but choose by intermediate nodes in MorphMix. 12
  • 13. Comparison and Conclusion Anonymizer Tor Tarzan S. anon. to R. ☺ R. anon. to S. ☺ Scalability ☺ Usability ☺ Popularity ☺ ☺ 13
  • 14. Thank you Peng Deng MEDC Student SUM Research Lab CSSE University of Melbourne pdeng@students.csse.unimelb.edu.au Monday, May 19, 2008 14