SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Anonymizing Networks



                                         Peng Deng
                pdeng@students.csse.unimelb.edu.au
                                         ∑ SUM Lab
                      CSSE University of Melbourne
Agenda
• Introduction
   – Background
   – Threats
   – Taxonomy

• Different Approaches
   – Centralized approaches
      • Proxy
      • Crowds
   – Distributed approaches
      • Classical MIX
      • Tor
      • Tarzan

• Comparison and Conclusion


                                  2
Background
•   Internet was designed with accountability in mind



•   Anonymous network can be used to:
     –   Support free of speech
     –   Censorship resistant communication
     –   Preserve privacy                      -Identification: Identifies the current datagram
                                               -Time-to-Live: Fingerprint of OS
     –   Distribute materials
                                               -Source Address
                                               -Destination Address
                                               -Port Number

•   Encryption is not enough to preserve privacy
     – Encryption can only hide the content of message
     – Both initiator and receiver’s anonymity should be preserved



                                                                                                  3
Threats
         Threats                         Prevent Methods
Message coding attack   Re-encrypting message when transmitting packets
Message length attack   between nodes, padding

Replay attack           Maintain a temporary database to record processed
                        packet
Collusion attack        More intermediate nodes in network
Flooding attack         P2P network is preferred rather than centralized
                        services
Message volume attack   Network width traffic analysis, hard to prevent
Timing attack
Profiling attack




                                                                           4
Taxonomy
                                             High latency   Low latency


                        Central              Email relay    Web proxy
                        Distributed and      N/A            MIX
                        Pseudo-distributed



•Central/High latency: anon.penet.fi and MixMaster

•Central/Low latency: Anonymizer and SafeWeb

•Pseudo-Distributed/High Latency and Distributed/High Latency: N/A

•Pseudo-Distributed/Low Latency and Distributed/Low latency : Tor, Tarzan and MorphMix




                                                                                         5
Centralized approaches
Proxy:

    •Proxy reveals identity                             SSL
    •Adversary blocks access to proxy (DoS)    Client         Proxy   Web server




                                                        SSL
    •Traffic analysis is easy                  Client         Proxy   Web server




    •Adversary blocks connections from proxy            SSL

                                               Client         Proxy   Web server
Example services are:
•Anonymizer
•SafeWeb
                                                                                   6
Centralized approaches cont.
Crowds:            Registration
                     Server       1
                                           2

                       5
                                                Destination
                                       3          Server

                                  4   Crowd

1. Register to server and retrieve network topology information

2. Server updates new topology information to every node

3. Initiator sends packet to another randomly selected node

4. The node randomly decides relay the packet again or send out
                                                                  7
Distributed approaches
Chaum’s MIX network:




                                       Nxt
                          Nxt
                          adr
                                Nxt
                                adr
                                        adr    Real Payload
                                      (True)



•Layered encryption
•Node can only know its successor and predecessor
•Packet padding and cover traffic can be applied

                                                              8
Distributed approaches cont.
The Onion Router: (Pseudo-distributed)
     Alice’s
     Computer
                                         OR2
   App1     App2
                                     1
                                                       2     2
                               OR1
                       1
        LP                                         1
                                                             OR3       WS2
                           2
                                               2
                                 OR7                       OR6
   Directory Service                                               1   WS1




•MIX encoding creates encrypted tunnel of relays
•Packet forwarding through tunnel
•Small-scale, static network

+ Individual malicious relays cannot reveal identity
-Adversary targets core routers and directory server
-Network-edge analysis still exists
-Scalability is a problem                                                    9
Distributed approaches cont.
     The Onion Router’s Hidden Service
     + Provide anonymity service            3                                            2
     -- Within TOR network only                              Database

                                                                             4

                                                4
                                                                                     1
                                                        IP              IP
                                                                             1
                                    Alice
                                                5                                            Hidden server

                                                        RP

                                                    6                            5
1.   Server picks some introduction points and build circuits to them
2.   Server advertises his hidden service “XYZ.onion” at the DB
3.   Alice hears “XYZ.onion” exists, and she requests information from DB
4.   Alice writes a message with rendezvous point to hidden server through introduction point
5.   Alice and hidden server validate one-time secret in rendezvous point
6.   Tor circuits established between Alice and hidden server
                                                                                                       10
Distributed approaches cont.
  Tarzan and MorphMix: (Distributed)


                                                             PNAT




•No distinction between anon proxies and clients
          Peer-to-peer model
•Anonymity against corrupt relays
          MIX-net encoding
          Robust tunnel selection
          Prevent adversary spoofing or running many nodes
•Anonymity against global eavesdropping
          Cover traffic protects all edges
          Restrict topology to make cover practical
          Choose neighbors in verifiably-random manner
•Application-independence
          Low-latency IP-layer redirection
                                                                11
Distributed approaches cont.
Tarzan and MorphMix: (Distributed)


•Join the system
1. Contacts known peers to learn neighbor lists              PNAT
2. Validates each peer by directly ping

•Cover the traffic within mimics
     1. Nodes send at some traffic rate per time period
     2. Traffic rate independent of actual demand
     3. All packets are same length and link encrypted
     + Reduce the network overhead

•Peer selection
Assumption: Adversary nodes are mostly in same IP area
Method: Randomly select IP address in different subnet

The path of communication is not defined by initiator but
choose by intermediate nodes in MorphMix.
                                                            12
Comparison and Conclusion
                  Anonymizer   Tor   Tarzan

 S. anon. to R.                       ☺
 R. anon. to S.                ☺
  Scalability                         ☺
   Usability         ☺
  Popularity         ☺         ☺


                                              13
Thank you

                                 Peng Deng
                             MEDC Student
                        SUM Research Lab
              CSSE University of Melbourne
        pdeng@students.csse.unimelb.edu.au
                    Monday, May 19, 2008
                                         14

Contenu connexe

Tendances

Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricBangladesh Network Operators Group
 
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionAPNIC
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018CodeOn
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Toolncct
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AAKASH S
 
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PROIDEA
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...ijdpsjournal
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)btpsec
 
How You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from NowHow You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from Nowjulievreeland
 
On her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyOn her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyStephen Kho
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameJaime Sánchez
 
From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13Jaime Sánchez
 
Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolMehedi
 
Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!stricaud
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 

Tendances (20)

Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
 
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and Discussion
 
Exploiting Layer 2
Exploiting Layer 2Exploiting Layer 2
Exploiting Layer 2
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018
 
Preventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP addressPreventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP address
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
 
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
 
How You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from NowHow You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from Now
 
On her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyOn her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy Agency
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse game
 
From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13
 
Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocol
 
Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Duan
DuanDuan
Duan
 

Similaire à Anonymous Network

Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?RIPE NCC
 
CNIT 124: Ch 7: Capturing Traffic
CNIT 124: Ch 7: Capturing TrafficCNIT 124: Ch 7: Capturing Traffic
CNIT 124: Ch 7: Capturing TrafficSam Bowne
 
Spying The Wire
Spying The WireSpying The Wire
Spying The WireDon Anto
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminskyDan Kaminsky
 
Apcon launch sequence highlights
Apcon launch sequence highlightsApcon launch sequence highlights
Apcon launch sequence highlightsChelseaTenfold
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsBiagio Botticelli
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabusVinay Kumar C
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LANArpit Suthar
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
 
communication system l2
communication system l2communication system l2
communication system l2MR Z
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn FortinetDigicomp Academy AG
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoDigicomp Academy AG
 

Similaire à Anonymous Network (20)

Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
CNIT 124: Ch 7: Capturing Traffic
CNIT 124: Ch 7: Capturing TrafficCNIT 124: Ch 7: Capturing Traffic
CNIT 124: Ch 7: Capturing Traffic
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
 
Rumor riding
Rumor ridingRumor riding
Rumor riding
 
Apcon launch sequence highlights
Apcon launch sequence highlightsApcon launch sequence highlights
Apcon launch sequence highlights
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabus
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
03. osi reference-layer
03. osi reference-layer03. osi reference-layer
03. osi reference-layer
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
communication system l2
communication system l2communication system l2
communication system l2
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live Demo
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
 
The Onion Routing (TOR)
The Onion Routing (TOR)The Onion Routing (TOR)
The Onion Routing (TOR)
 

Plus de pauldeng

Toy robot simulator
Toy robot simulatorToy robot simulator
Toy robot simulatorpauldeng
 
Deng Peng document template
Deng Peng document templateDeng Peng document template
Deng Peng document templatepauldeng
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real Worldpauldeng
 
Scaling a Rich Client to Half a Billion Users
Scaling a Rich Client to Half a Billion UsersScaling a Rich Client to Half a Billion Users
Scaling a Rich Client to Half a Billion Userspauldeng
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overviewpauldeng
 
无线识别技术
无线识别技术无线识别技术
无线识别技术pauldeng
 
Issnip Presentation
Issnip PresentationIssnip Presentation
Issnip Presentationpauldeng
 
6 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 200802066 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 20080206pauldeng
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real Worldpauldeng
 
Acceleration Based Hci Prototype
Acceleration Based Hci PrototypeAcceleration Based Hci Prototype
Acceleration Based Hci Prototypepauldeng
 
Sunspot Final
Sunspot FinalSunspot Final
Sunspot Finalpauldeng
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networkspauldeng
 
IDEA Lab Presentation
IDEA Lab PresentationIDEA Lab Presentation
IDEA Lab Presentationpauldeng
 
Introduction To SPOT
Introduction To SPOTIntroduction To SPOT
Introduction To SPOTpauldeng
 

Plus de pauldeng (19)

Toy robot simulator
Toy robot simulatorToy robot simulator
Toy robot simulator
 
Deng Peng document template
Deng Peng document templateDeng Peng document template
Deng Peng document template
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real World
 
V We
V WeV We
V We
 
Final
FinalFinal
Final
 
Scaling a Rich Client to Half a Billion Users
Scaling a Rich Client to Half a Billion UsersScaling a Rich Client to Half a Billion Users
Scaling a Rich Client to Half a Billion Users
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overview
 
无线识别技术
无线识别技术无线识别技术
无线识别技术
 
Issnip Presentation
Issnip PresentationIssnip Presentation
Issnip Presentation
 
6 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 200802066 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 20080206
 
Programming The Real World
Programming The Real WorldProgramming The Real World
Programming The Real World
 
Acceleration Based Hci Prototype
Acceleration Based Hci PrototypeAcceleration Based Hci Prototype
Acceleration Based Hci Prototype
 
Sunspot Final
Sunspot FinalSunspot Final
Sunspot Final
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networks
 
Idea Lab
Idea LabIdea Lab
Idea Lab
 
IDEA Lab Presentation
IDEA Lab PresentationIDEA Lab Presentation
IDEA Lab Presentation
 
Sunspot
SunspotSunspot
Sunspot
 
Sunspot
SunspotSunspot
Sunspot
 
Introduction To SPOT
Introduction To SPOTIntroduction To SPOT
Introduction To SPOT
 

Dernier

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Dernier (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Anonymous Network

  • 1. Anonymizing Networks Peng Deng pdeng@students.csse.unimelb.edu.au ∑ SUM Lab CSSE University of Melbourne
  • 2. Agenda • Introduction – Background – Threats – Taxonomy • Different Approaches – Centralized approaches • Proxy • Crowds – Distributed approaches • Classical MIX • Tor • Tarzan • Comparison and Conclusion 2
  • 3. Background • Internet was designed with accountability in mind • Anonymous network can be used to: – Support free of speech – Censorship resistant communication – Preserve privacy -Identification: Identifies the current datagram -Time-to-Live: Fingerprint of OS – Distribute materials -Source Address -Destination Address -Port Number • Encryption is not enough to preserve privacy – Encryption can only hide the content of message – Both initiator and receiver’s anonymity should be preserved 3
  • 4. Threats Threats Prevent Methods Message coding attack Re-encrypting message when transmitting packets Message length attack between nodes, padding Replay attack Maintain a temporary database to record processed packet Collusion attack More intermediate nodes in network Flooding attack P2P network is preferred rather than centralized services Message volume attack Network width traffic analysis, hard to prevent Timing attack Profiling attack 4
  • 5. Taxonomy High latency Low latency Central Email relay Web proxy Distributed and N/A MIX Pseudo-distributed •Central/High latency: anon.penet.fi and MixMaster •Central/Low latency: Anonymizer and SafeWeb •Pseudo-Distributed/High Latency and Distributed/High Latency: N/A •Pseudo-Distributed/Low Latency and Distributed/Low latency : Tor, Tarzan and MorphMix 5
  • 6. Centralized approaches Proxy: •Proxy reveals identity SSL •Adversary blocks access to proxy (DoS) Client Proxy Web server SSL •Traffic analysis is easy Client Proxy Web server •Adversary blocks connections from proxy SSL Client Proxy Web server Example services are: •Anonymizer •SafeWeb 6
  • 7. Centralized approaches cont. Crowds: Registration Server 1 2 5 Destination 3 Server 4 Crowd 1. Register to server and retrieve network topology information 2. Server updates new topology information to every node 3. Initiator sends packet to another randomly selected node 4. The node randomly decides relay the packet again or send out 7
  • 8. Distributed approaches Chaum’s MIX network: Nxt Nxt adr Nxt adr adr Real Payload (True) •Layered encryption •Node can only know its successor and predecessor •Packet padding and cover traffic can be applied 8
  • 9. Distributed approaches cont. The Onion Router: (Pseudo-distributed) Alice’s Computer OR2 App1 App2 1 2 2 OR1 1 LP 1 OR3 WS2 2 2 OR7 OR6 Directory Service 1 WS1 •MIX encoding creates encrypted tunnel of relays •Packet forwarding through tunnel •Small-scale, static network + Individual malicious relays cannot reveal identity -Adversary targets core routers and directory server -Network-edge analysis still exists -Scalability is a problem 9
  • 10. Distributed approaches cont. The Onion Router’s Hidden Service + Provide anonymity service 3 2 -- Within TOR network only Database 4 4 1 IP IP 1 Alice 5 Hidden server RP 6 5 1. Server picks some introduction points and build circuits to them 2. Server advertises his hidden service “XYZ.onion” at the DB 3. Alice hears “XYZ.onion” exists, and she requests information from DB 4. Alice writes a message with rendezvous point to hidden server through introduction point 5. Alice and hidden server validate one-time secret in rendezvous point 6. Tor circuits established between Alice and hidden server 10
  • 11. Distributed approaches cont. Tarzan and MorphMix: (Distributed) PNAT •No distinction between anon proxies and clients Peer-to-peer model •Anonymity against corrupt relays MIX-net encoding Robust tunnel selection Prevent adversary spoofing or running many nodes •Anonymity against global eavesdropping Cover traffic protects all edges Restrict topology to make cover practical Choose neighbors in verifiably-random manner •Application-independence Low-latency IP-layer redirection 11
  • 12. Distributed approaches cont. Tarzan and MorphMix: (Distributed) •Join the system 1. Contacts known peers to learn neighbor lists PNAT 2. Validates each peer by directly ping •Cover the traffic within mimics 1. Nodes send at some traffic rate per time period 2. Traffic rate independent of actual demand 3. All packets are same length and link encrypted + Reduce the network overhead •Peer selection Assumption: Adversary nodes are mostly in same IP area Method: Randomly select IP address in different subnet The path of communication is not defined by initiator but choose by intermediate nodes in MorphMix. 12
  • 13. Comparison and Conclusion Anonymizer Tor Tarzan S. anon. to R. ☺ R. anon. to S. ☺ Scalability ☺ Usability ☺ Popularity ☺ ☺ 13
  • 14. Thank you Peng Deng MEDC Student SUM Research Lab CSSE University of Melbourne pdeng@students.csse.unimelb.edu.au Monday, May 19, 2008 14