Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most.

Slides:



Advertisements
Similar presentations
Service Bus Service Bus Access Control.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
Evaluation of a Scalable P2P Lookup Protocol for Internet Applications
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
A Scalable Virtual Registry Service for jGMA Matthew Grove CCGRID WIP May 2005.
SDN and Openflow.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Component Patterns – Architecture and Applications with EJB copyright © 2001, MATHEMA AG Component Patterns Architecture and Applications with EJB JavaForum.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Threads Section 2.2. Introduction to threads A thread (of execution) is a light-weight process –Threads reside within processes. –They share one address.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
JXTA P2P Platform Denny Chen Dai CMPT 771, Spring 08.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
System Architecture for Billing of Multi- Player Games in a Wireless Environment using GSM/UMTS and WLAN Services Femi Adeyemo 11/21/02.
Software Frameworks for Acquisition and Control European PhD – 2009 Horácio Fernandes.
SANS A Simple Ad hoc Network Simulator Nicolas Burri Roger Wattenhofer Yves Weber Aaron Zollinger.
CS682 Session 6 Prof. Katz. Firewalls An intelligent router? Used as a traffic control mechanism Based on information in the Layer 3 and 4 headers Administrator.
Project Progress Presentation GENERATION OF NS2 TRACE FILES FOR SATELLITE-WIRELESS NETWORKS CS603 - Wireless Communications & Networks Summer II 2003 Wasim.
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
Lecture Week 7 Implementing IP Addressing Services.
Damian Gordon.  When we hook up computers together using data communication facilities, we call this a computer network.
Jadavpur University Centre for Mobile Computing & Communication Implementation of Ad-Hoc Mesh Network Presentation by: Sudipto Das Rajesh Roy.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Client/Server Architectures
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
CONVERGENCE KO Meeting EXPRESS: Implementing an SDN infrastructure over a federation of testbeds (experiment within the OpenLab project) Stefano Salsano.
Intranet, Extranet, Firewall. Intranet and Extranet.
Internet 2 Corporate Value Proposition Stuart Kippelman (J&J) Jeff Lemmer (Ford) December 12, 2005.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Dynamic Firewalls and Service Deployment Models for Grid Environments Gian Luca Volpato, Christian Grimm RRZN – Leibniz Universität Hannover Cracow Grid.
Implementing IP Addressing Services Accessing the WAN – Chapter 7.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
Sharing Information across Congestion Windows CSE222A Project Presentation March 15, 2005 Apurva Sharma.
Component Technology. Challenges Facing the Software Industry Today’s applications are large & complex – time consuming to develop, difficult and costly.
Tool Integration with Data and Computation Grid GWE - “Grid Wizard Enterprise”
Simulation of the OLSRv2 Protocol First Report Presentation.
SSE Riga Consulting Club. 11/6/ The Idea In Brief Concept: SSE Riga Consulting Club – a student-run organization with a purpose to: Provide the.
Firewall Security.
Analysis. Solution Requirements 1. Identify the functions and attributes of the website. 2. Write a problem statement. (What is the problem? What will.
NGMAST 2008 A Proactive and Distributed QoS Negotiation Approach for Heterogeneous environments Anis Zouari, Lucian Suciu, Jean Marie Bonnin, and Karine.
This paper appears in: Computer Communications and Networks, ICCCN Proceedings.15th International Conference on 指導教授 : 許子衡 報告者 : 黃群凱 1.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Unit 9: Distributing Computing & Networking Kaplan University 1.
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
A Scalable Virtual Registry Service for jGMA Matthew Grove DSG Seminar 3 rd May 2005.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
Tool Integration with Data and Computation Grid “Grid Wizard 2”
1 MSCS 237 Introduction to Distributed Systems. 2 Outline Distributed computing (DC) Distributed Systems (DS) Motivation Architecture of a DS Advantages.
SOS: An Architecture For Mitigating DDoS Attacks Authors: Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. Published: ACM SIGCOMM 2002 Presenter: Jerome.
RETS Working Group August 5, 2004Slide 1 RETS 2.0 – Bridging the Gap Sergio Del Rio Templates 4 Business Inc.
Theme Guidance - Network Traffic Proposed NMLRG IETF 95, April 2016 Sheng Jiang (Speaker, Co-chair) Page 1/6.
Survivability in IP-over-WDM Networks. Introduction Multilayer network architecture is moving into IP-optimized two-layer architecture. ․ They have same.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Zueyong Zhu† and J. William Atwood‡
Introducing To Networking
Implementing IP Addressing Services
Computer software.
Firewalls Routers, Switches, Hubs VPNs
Implementing IP Addressing Services
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most importantly – their own user base. The goal of this project is to create an infrastructure which these various solutions can be combined via a generic anonymous network protocol.

Unified Message Structure The first step to unify different protocols is to have a standard agreement among network traffic – in this case a unified network message structure:

Routing Rules and Tables Much like NAT within routers – nodes within the generic anonymous network have routing rules and tables. This means that network data is only meaningful to its targeted node(s), and more importantly have little to no meaning for potential attackers.

Processors System Processors Core processors that are required to interface with and perform actions on hosted nodes: ReserveRPRProcessor FinaliseRPRProcessor RelayMessageProcessor Guest Processors Guest processors are externally written and extend the processor family. They can be downloaded on hosted nodes and executed via route rules. AddPublishedProcessor AddUnPublishedProcessor

Composite Processors The real potential of processors is to combine separate, possibly unrelated processors, into a new short lived temporary processor – called a composite processor. Composite processors can use any combination of system, published and unpublished processors.

Network Unobservability Any algorithm can be utilised on a node via the unpublished processors – this introduces a large degree of uncertainty as to how nodes behave. Meaning that identical inputs can produce completely different and unrelated outputs.

System Overview

Combining User Bases The ultimate goal is to unite different user bases to expand the anonymous community. This doesn’t mean to re-invent the wheel – rather the opposite is proposed. Existing infrastructures have the opportunity to join the generic network but still keep all their current users, clients and servers as is. This is achieved by hosting nodes running published and/or unpublished processors that either implement an existing algorithm or bridge the gap between the two networks.

Network Topologies

Research Benefits A large user base, existing servers and nodes act as a established network backbone. Coupled with the ability to execute external code via unpublished processors researchers can build and experiment with new types of anonymous communication methods. A large problem faced by those building innovative anonymous protocols is the need to test them – and real world results are required. Previously lots of time, money and resources were needed to put together a network infrastructure to achieve this. The generic anonymous protocol solves this issue by allowing the existing networks to be utilised.

Acknowledgements Matthew Bolger – Student Shaahin Madani, Ibrahim Khalil – Supervisors