Nytro Posted November 15, 2014 Report Posted November 15, 2014 Traffic Analysis Attacks and Defenses in Low Latency Anonymous CommunicationSambuddho ChakravartyThe recent public disclosure of mass surveillance of electronic communication, involvingpowerful government authorities, has drawn the public’s attention to issues regardingInternet privacy. For almost a decade now, there have been several research efforts towardsdesigning and deploying open source, trustworthy and reliable systems that ensure users’anonymity and privacy. These systems operate by hiding the true network identity of communicatingparties against eavesdropping adversaries. Tor, acronym for The Onion Router,is an example of such a system. Such systems relay the traffic of their users through anoverlay of nodes that are called Onion Routers and are operated by volunteers distributedacross the globe. Such systems have served well as anti-censorship and anti-surveillancetools. However, recent publications have disclosed that powerful government organizationsare seeking means to de-anonymize such systems and have deployed distributed monitoringinfrastructure to aid their efforts.Attacks against anonymous communication systems, like Tor, often involve traffic analysis.In such attacks, an adversary, capable of observing network traffic statistics in severaldifferent networks, correlates the traffic patterns in these networks, and associates otherwiseseemingly unrelated network connections. The process can lead an adversary to thesource of an anonymous connection. However, due to their design, consisting of globallydistributed relays, the users of anonymity networks like Tor, can route their traffic virtuallyvia any network; hiding their tracks and true identities from their communication peersand eavesdropping adversaries. De-anonymization of a random anonymous connection ishard, as the adversary is required to correlate traffic patterns in one network link to those invirtually all other networks. Past research mostly involved reducing the complexity of thisprocess by first reducing the set of relays or network routers to monitor, and then identifyingthe actual source of anonymous traffic among network connections that are routed via thisreduced set of relays or network routers to monitor. A study of various research efforts inthis field reveals that there have been many more efforts to reduce the set of relays or routersto be searched than to explore methods for actually identifying an anonymous user amidstthe network connections using these routers and relays. Few have tried to comprehensivelystudy a complete attack, that involves reducing the set of relays and routers to monitor andidentifying the source of an anonymous connection. Although it is believed that systemslike Tor are trivially vulnerable to traffic analysis, there are various technical challenges andissues that can become obstacles to accurately identifying the source of anonymous connection.It is hard to adjudge the vulnerability of anonymous communication systems withoutadequately exploring the issues involved in identifying the source of anonymous traffic.Download: http://cryptome.org/2014/11/sambuddho_thesis.pdf Quote