Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.

Slides:



Advertisements
Similar presentations
Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University.
Advertisements

A Probabilistic Analysis of Onion Routing in a Black-box Model 10/29/2007 Workshop on Privacy in the Electronic Society Aaron Johnson (Yale) with Joan.
A Formal Analysis of Onion Routing 10/26/2007 Aaron Johnson (Yale) with Joan Feigenbaum (Yale) Paul Syverson (NRL)
Definition of the Anonymity of Mix Network Runs Andrei Serjantov University of Cambridge Computer Laboratory.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Wavelength Assignment in Optical Network Design Team 6: Lisa Zhang (Mentor) Brendan Farrell, Yi Huang, Mark Iwen, Ting Wang, Jintong Zheng Progress Report.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
Scale Free Networks Robin Coope April Abert-László Barabási, Linked (Perseus, Cambridge, 2002). Réka Albert and AL Barabási,Statistical Mechanics.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Estimating the Global PageRank of Web Communities Paper by Jason V. Davis & Inderjit S. Dhillon Dept. of Computer Sciences University of Texas at Austin.
1 Lecture 23: Interconnection Networks Topics: communication latency, centralized and decentralized switches (Appendix E)
2001 Winter CS215 Course Project Simulation Comparison of Routing Algorithms for Multicast with Bandwidth Reservation Zhihong Duan
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Analysis of Onion Routing Presented in by Jayanthkumar Kannan On 10/8/03.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 Lecture 24: Interconnection Networks Topics: communication latency, centralized and decentralized switches (Sections 8.1 – 8.5)
Quickest path and Quickest routing: A dynamic routing method Research Topic: Jiang, XidongMS candidate in computer science at California State University,
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Discrete Probability Distributions
MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
Towards an Analysis of Onion Routing Security Syverson, Tsudik, Reed, and Landwehr PET 2000 Presented by: Adam Lee 1/26/2006 Syverson, Tsudik, Reed, and.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Provable Protocols for Unlinkability Ron Berman, Amos Fiat, Amnon Ta-Shma Tel Aviv University.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Anonymity on the Internet Presented by Randy Unger.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Denial-of-Service Flooding Detection in Anonymity Networks Computer Networks & Communications Group Institute for IT-Security and Security Law University.
The PageRank Citation Ranking: Bringing Order to the Web Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd Presented by Anca Leuca, Antonis Makropoulos.
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
1 Anonymity and Covert Channels in Simple, Timed Mix-firewalls Richard E. Newman --- UF Vipan R. Nalla -- UF Ira S. Moskowitz --- NRL
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
An Analysis of Parallel Mixing with Attacker-Controlled Inputs Nikita Borisov formerly of UC Berkeley.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
15-853:Algorithms in the Real World
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Performance Evaluation Lecture 1: Complex Networks Giovanni Neglia INRIA – EPI Maestro 10 December 2012.
Effectiveness of Blending Attacks on Mixes Meng Tang.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory.
Effects of Adding Arbitrary Physical Nodes(APNs) to a Mobile Ad-Hoc Network (MANET)Utilizing a Anonymous Routing Protocol.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Random Walk for Similarity Testing in Complex Networks
Data Center Network Architectures
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
Anonymity Metrics R. Newman.
Towards Measuring Anonymity
0x1A Great Papers in Computer Security
Free-route Mixes vs. Cascades
Anonymity - Background
Modeling Entropy in Onion Routing Networks
第八届全国复杂网络学术会议 Spectra of transition matrix for networks: Computation and applications 章 忠 志 复旦大学计算机科学技术学院 Homepage:
Anonymity – Generalizing Mixes
Presentation transcript:

Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing Technologies Workshop 2003

Mix networks with restricted routes PET 2003 Summary ● 'Brief' introduction to mixes and mix networks – Basic building blocks and networks ● Abstracting mix networks as mixes – Assessing the anonymity they provide ● Properties – Resistance to traffic analysis, volumes of traffic... ● What about restricted routes?

Mix networks with restricted routes PET 2003 Basic building block: The MIX ● Hiding correspondence between inputs and outputs. ● An adversary's view: bitwise unlinkability + mixing Mix node Inputs Outputs Mix node Inputs Outputs

Mix networks with restricted routes PET 2003 Distributing trust: Cascade ● If the mix is corrupt then there is no anonymity. ● Solution cascade of mixes (Berthold): ● If one mix is honest then we still have maximal anonymity. ● But: Latency is increased. Inputs Outputs Mix 1 Mix 2Mix 3 Mix 4

Mix networks with restricted routes PET 2003 Distributing load: Mix Networks ● To decrease the latency, and distribute the load while still distributing trust. (Chaum) ● Original design: all mixes can talk to all others. ● Client needs to choose a route through the network. (sub-optimal anonymity)

Mix networks with restricted routes PET 2003 Mix network with restricted routes ● For some reason mixes can only talk to a few neighbors (topology, padding, bandwidth,...) ● Route selection requires more information. ● How does this compares to fully connected mix networks? ● Other properties: DoS, trust,...

Mix networks with restricted routes PET 2003 Mix networks as abstract mixes ● What we would like the adversary to see is only the inputs and outputs. Perfect Mixing... ● But in practice other info is also available: – Topology – First and last mix – Traffic characteristics on each link.

Mix networks with restricted routes PET 2003 Traffic Confirmation vs. Traffic Analysis ● Traffic confirmation (Syverson et al.): – Attacks that do not use the additional info leaked by the network. – Topology affects them but we will not discuss further... ● Traffic analysis: – Attacks that make use of the additional information. (Topology, route length, traffic characteristics,...) ● 'Traffic analysis of restricted routes networks'.

Mix networks with restricted routes PET 2003 Properties Required ● Anonymity defined in information theoretic terms (Serjantov, Danezis). – Route selection knowledge cannot reduce anonymity. – Uniform anonymity is provided. – The traffic observed should not give much additional information to attacker. – Resistance to intersection attacks (in network). ● Other: Resistance to corrupt nodes, active attacks, DoS.

Mix networks with restricted routes PET 2003 Modeling Mix Networks ● We model mix networks using Graph Theory. ● The Route selection process is approximated by a random walk on the topology graph. – We require this to lead to the stationary prob. Dist. from any starting node (uniformity) ● The 'Traffic Matrix' describes the actual probabilities assigned to a message given the observed traffic in the network. – A random walk on this matrix should lead to the same distribution as the above.

Mix networks with restricted routes PET 2003 Assessing the route length ● Key result: if the network has 'good mixing properties' only O(logN) steps are required. – The mixing is uniform in O(logN) ● Good mixing properties: – Topology is an Expander Graph. – Constant degree D graphs (each node only knows few neighbors) have such properties. – Gory detail: Exact number of rounds depends on the spectral gap between the first and second eigenvalue of graph.

Mix networks with restricted routes PET 2003 How much traffic is required? ● The aim is to make: 'traffic matrix' = topology matrix ● We can require it to only deviate by a small percentage on all links. – Assuming that the route selection was done using the topology matrix calculate after how much traffic they converge. – The choice of next link at each node is described by the multinomial dist: Calculate the volume requited to get the expectation (depends on mixing strategy).

Mix networks with restricted routes PET 2003 Resistance to Intersection Attacks ● Intersection attacks on the mixes (Berthold). – Replay attacks or streams of messages using the same path. ● Key result: needs K>O(bp/(1-p) ) rounds to confirm that a messages takes a path. – Where b is the batch size and p the prob of taking the link tested. – Result only valid for threshold mix. ● The smaller the number of links (as in restricted routes) the larged min(p) -> the larger K.

Mix networks with restricted routes PET 2003 Advantages of Restricted Routes ● Quick mixing: in O(logN) steps. ● Better resistance to intersection attacks. ● Scale well: Only O(N) amount of traffic is required in the network at any time to make it secure against traffic analysis. ● Analysis of fully connected mix networks: – TM is not equal to route selection matrix in general. – Resistance to intersection attacks is poor. – Does not automatically mean they are broken!

Mix networks with restricted routes PET 2003 Conclusions & Further directions ● A better understanding of general mix networks. ● Further work should look at resistance to corrupt nodes, denial of service attacks and active attacks. ● Results are dependent on a good expander graph topology. Who creates it? How is it managed? ● Resistance to intersection and TA attacks lead us to the topic of cover traffic. ● Less general restricted route topologies with more provable properties...

Mix networks with restricted routes PET 2003 Questions? ● Contact details: