Towards Measuring Anonymity

Slides:



Advertisements
Similar presentations
Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University.
Advertisements

Definition of the Anonymity of Mix Network Runs Andrei Serjantov University of Cambridge Computer Laboratory.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Evaluation of Header Field Entropy for Hash-Based Packet Selection Evaluation of Header Field Entropy for Hash-Based Packet Selection Christian Henke,
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Background Knowledge Brief Review on Counting,Counting, Probability,Probability, Statistics,Statistics, I. TheoryI. Theory.
1 Modeling and Analysis of Anonymous-Communication Systems Joan Feigenbaum WITS’08; Princeton NJ; June 18, 2008 Acknowledgement:
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
The Impact of Spatial Correlation on Routing with Compression in WSN Sundeep Pattem, Bhaskar Krishnamachri, Ramesh Govindan University of Southern California.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Towards an Analysis of Onion Routing Security Syverson, Tsudik, Reed, and Landwehr PET 2000 Presented by: Adam Lee 1/26/2006 Syverson, Tsudik, Reed, and.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
INFORMATION THEORY BYK.SWARAJA ASSOCIATE PROFESSOR MREC.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Flooding-Based Geocasting Protocol for Mobile Ad Hoc Network YOUNG-BAE KO NITIN H. VAIDYA.
1 Performance Evaluation of Computer Networks: Part II Objectives r Simulation Modeling r Classification of Simulation Modeling r Discrete-Event Simulation.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Lecture 12 Statistical Inference (Estimation) Point and Interval estimation By Aziza Munir.
TOPIC THREE Chapter 4: Understanding Risk and Return By Diana Beal and Michelle Goyen.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
How Science Works The following PowerPoint is aimed at enhancing skills learnt at GCSE when performing experiments. Pupils must commit the terminology.
Gergely Tóth, 5 November Nordsec 2004, Helsinki, Finland, 4-5 November 2004 Measuring Anonymity Revisited Gergely Tóth Zoltán Hornák Ferenc Vajda.
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
COMMUNICATION NETWORK. NOISE CHARACTERISTICS OF A CHANNEL 1.
1 Dr. Ali Amiri TCOM 5143 Lecture 8 Capacity Assignment in Centralized Networks.
LANGUAGE MODELS FOR RELEVANCE FEEDBACK Lee Won Hee.
Choice under uncertainty Assistant professor Bojan Georgievski PhD 1.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Mixminion: Design of a Type III Anonymous R er Protocol George Danezis Roger Dingledine Nick Mathewson Presented By Michael LeMay.
Guard Sets for Onion Routing JOSHUA FREE. Tor Most popular low-latency distributed anonymity network Controversial decisions of guard selection strategies.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Prepared by: Engr. Jo-Ann C. Viñas 1 MODULE 2 ENTROPY.
Gergely Tóth, 23 September IWCIT’03, Gliwice, Poland, September 2003 Measure for Anonymity Gergely Tóth Budapest University of Technology and.
Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
Introduction A probability distribution is obtained when probability values are assigned to all possible numerical values of a random variable. It may.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Chapter 6 – Continuous Probability Distribution Introduction A probability distribution is obtained when probability values are assigned to all possible.
Basic Concepts of Information Theory Entropy for Two-dimensional Discrete Finite Probability Schemes. Conditional Entropy. Communication Network. Noise.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Decision Trees (suggested time: 30 min)
Anonymity Metrics R. Newman.
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
An Introduction to Privacy and Anonymous Communication
Anonymity in Structured Peer-to-Peer Networks
IV-2 Manufacturing Systems modeling
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Free-route Mixes vs. Cascades
Quantum Information Theory Introduction
Where did we stop? The Bayes decision rule guarantees an optimal classification… … But it requires the knowledge of P(ci|x) (or p(x|ci) and P(ci)) We.
Simulation and Analysis of Question Routing in Social Networks
How Science Works The following PowerPoint is aimed at enhancing skills learnt at GCSE when performing experiments. Pupils must commit the terminology.
Korea University of Technology and Education
Modeling Entropy in Onion Routing Networks
Information Theoretical Analysis of Digital Watermarking
Kalman Filter: Bayes Interpretation
Anonymity – Generalizing Mixes
Contributors: Connor McCoy
Presentation transcript:

Towards Measuring Anonymity Claudia Díaz COSIC Group, K.U.Leuven (Belgium) http://www.esat.kuleuven.ac.be/cosic claudia.diaz@esat.kuleuven.ac.be April 2002

Contents Introduction Entropy Model Degree of anonymity Examples: Remailer Crowds Onion Routing Extension and alternative solution Conclusions and future work

Introduction Context: systems that provide anonymous connections (Crowds, Onion Routing, Mix networks, …) Goal: use information theory to measure the amount of information gained by an attacker by observing the system

Entropy (1) Definition of Entropy: Measure of the uncertainty of a random variable. Measure of the amount of information required on the average to describe the random variable Notation: H(X)

Entropy (2) Given a discrete random variable, X, that can take N possible values with probability greater than zero, (p1 … pN), the entropy of X is defined as:

Entropy (3) The more equally distributed, the more information (greater H(X)); the closer to a deterministic distribution, the less information (smaller H(X)) The entropy of X is a functional of the distribution of X, it does not depend on the values taken by X (X: set of possible senders; pi: probability that X = xi)

Model Anonymity: “state of being not identifiable within a set of subjects” Entities: senders, receivers, mixes (nodes, jondos) Attack model: Internal/External Passive/Active Local/Global

Assumptions (1) The attacker tries to find the sender of a particular message The attacker knows the number of users of the system (N) The attacker performs traffic analysis. An active attacker may introduce or delete messages from the system

Assumptions (2) After the attack, probabilities are assigned to the senders; the attacker obtains information of the form “with probability p, user A is the sender of the message” All users send in average the same number of messages A user sends messages which follow a Poisson distribution over the time

Assumptions (3) Passive attack: The maximum entropy is HM = log2N Active attack: The attacker can reduce the set of potential senders by deleting messages, the maximum entropy is calculated with the number remaining users

Degree of Anonymity (1) We define: H(X): entropy of the system after the attack HM: maximum achievable entropy for N users, HM = log2(N) Note that:

Degree of Anonymity (2) The degree of anonymity is defined as: Remarks: Independent from the number of senders

Example: Remailer

Remailer: Attack 1 Global, active, external attacker He blocks the messages of 8 users (anonymity set reduced to 2) Maximum entropy: HM = log2(2) = 1 After the attack (traffic analysis of remaining messages), the probability of user 1 of having sent message M is p. The probability of user 2 is (1-p)

Degree of anonymity

Remailer: Attack 2 Passive, global, external attacker Size of the anonymity set: 10 Maximum entropy: HM = log2(10) After the attack: pi = p/3, for i = 1, 2, 3 pi = (1-p)/7, for i = 4 … 10

Degree of anonymity

Example: Crowds

Crowds: Attack Attacker: internal, passive and local (collaborating jondos) Message goes through at least 1 corrupted jondo N: Number of members of the crowd C: Number of collaborating jondos Maximum entropy: HM = log2(N-C)

Degree of anonymity

Example: Onion Routing

Onion Routing: Attack Passive, global, external attacker Maximum entropy is HM=log2(N) After the traffic analysis, the attacker is able to discard some users. He has narrowed down the anonymity set to S users: pi = 1/S i = 1 … S pi = 0 i > S

Degree of anonymity

Extension of the model We may get different distributions with a certain probability (e.g., Crowds: the message may go through a corrupted jondo with probability p1 or not with probability p2 = 1 - p1) If a system offers a degree di with pi, we suggest: d =  pi · di

Alternative A system may have a requirement on the anonymity level of the type: “users should have at least a degree of anonymity equivalent to a system with M users and perfect indistinguishability” If the system does not meet the requirement launch an alarm (or use dummy traffic) Solution: we may compare the entropy with the reference value (HR=log2(M)), instead of comparing against the maximum entropy

Conclusions We propose a model to evaluate the degree of anonymity provided by a system With this scheme we have means to compare the effectiveness of different attack models Usefulness of Information Theory in this field of research.

Further Research on this Topic Find a minimum acceptable value for d Develop a model that takes into account contextual information (as a priori information) Evolution of the degree of anonymity with the time Measure the probability of finding a match sender-recipient (not focused on a particular message) Analyze the effect of dummy traffic