skip to main content
10.5555/1639809.1639899acmconferencesArticle/Chapter ViewAbstractPublication PagesspringsimConference Proceedingsconference-collections
research-article

Simulating low-latency anonymous networks

Published:22 March 2009Publication History

ABSTRACT

Measuring the effectiveness of proposed black box correlation attacks against deployed anonymous networks is not feasible. This results in not being able to measure the effectiveness of defensive techniques, or performance enhancements with respect to anonymity. To overcome this problem, a discrete, event-based network simulation of the Tor anonymous network is developed. The simulation is validated against traffic transmitted through the real Tor network and the scalability of the simulation is measured. Simulations with up to 16,000 clients were run, upon which several attacks are implemented thus allowing for a measure of anonymity. Experimental defensive techniques are tested with corresponding anonymity measured.

References

  1. J-sim website. http://www.j-sim.org/.Google ScholarGoogle Scholar
  2. Renesys corporation. http://www.renesys.com.Google ScholarGoogle Scholar
  3. A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Proceedings of Information Hiding Workshop (IH 2001), pages 245--257. Springer-Verlag, LNCS 2137, April 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-Resource Routing Attacks Against Anonymous Systems. Technical Report CU-CS-1025-07, University of Colorado at Boulder (2007).Google ScholarGoogle Scholar
  5. G. D. Bissias, M. Liberatore, and B. N. Levine. Privacy vulnerabilities in encrypted http streams. In Proceedings of Privacy Enhancing Technologies workshop (PET 2005), May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Breslau, D. Estrin, K. Fall, S. Floyd, J. Heidemann, A. Helmy, P. Huang, S. McCanne, K. Varadhan, Y. Xu, and H. Yu. Advances in network simulation. IEEE Computer, 33(5):59--67, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Brown and M. Kolberg. Tools for peer-to-peer network simulation. http://www1.tools.ietf.org/wg/irtf/draft-irtf-p2prg-core-simulators-00.txt.Google ScholarGoogle Scholar
  8. X. Chang. Network simulations with opnet. In WSC '99: Proceedings of the 31st conference on Winter simulation, pages 307--314, New York, NY, USA, 1999. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Cowie and H. Liu. Towards realistic million-node internet simulations. In Proceedings of the 1999 International Conference on Parallel and Distributed Processing Techniques and Applications, 1999.Google ScholarGoogle Scholar
  11. H. Daginawala and M. Wright. Studying Timing Analysis on the Internet with SubRosa. Lecture Notes in Computer Science, 5134:133--150, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Developers. Tor website (nov), 2008. http://tor.eff.org.Google ScholarGoogle Scholar
  13. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Feldmann, A. Gilbert, P. Huang, and W. Willinger. Dynamics of IP traffic: A study of the role of variability and the impact of control. Proceedings of ACM SIGCOMM'99, pages 301--313, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright. Timing attacks in low-latency mix-based systems. In A. Juels, editor, Proceedings of Financial Cryptography (FC '04). Springer-Verlag, LNCS 3110, February 2004.Google ScholarGoogle ScholarCross RefCross Ref
  16. M. Liljenstam, J. Liu, D. Nicol, Y. Yuan, G. Yan, and C. Grier. Rinse: the real-time immersive network simulation environment for network security exercises. Proceedings of the 19th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Liljenstam, D. Nicol, V. Berk, and R. Gray. Simulating realistic network worm traffic for worm warning system design and testing. Proceedings of the 2003 ACM workshop on Rapid Malcode, pages 24--33, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. E. Newman, I. S. Moskowitz, P. Syverson, and A. Serjantov. Metrics for traffic analysis prevention. In R. Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760, March 2003.Google ScholarGoogle Scholar
  19. D. Nicol. Scalability of network simulators revisited. In Procedings of Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS) part of Western Multi-Confernce (WMC), 2003.Google ScholarGoogle Scholar
  20. D. Nicol, J. Liu, M. Liljenstam, and G. Yan. Simulation of large scale networks I: simulation of large-scale networks using SSF. Proceedings of the 35th conference on Winter simulation: driving innovation, pages 650--657, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. G. O'Gorman and S. Blott. Large scale simulation of tor. In Advances in Computer Science ASIAN 2007. Computer and Network Security, volume 4846/2008 of Lecture Notes in Computer Science, pages 48--54. Springer Berlin / Heidelberg, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Proceedings of ESORICS 2003, October 2003.Google ScholarGoogle ScholarCross RefCross Ref
  23. V. Shmatikov and M.-H. Wang. Timing analysis in low-latency mix networks: Attacks and defenses. In Computer Security - ESORICS 2006, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. L. Sweeney. k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Varga. The omnet++ discrete event simulation system. In Proceedings of the European Simulation Multiconference (ESM'2001), 2001.Google ScholarGoogle Scholar
  26. B. Venkatraman and R. Newman-Wolfe. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. Computer Security Applications Conference, 1994. Proceedings., 10th Annual, pages 288--297, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  27. Y. Xiang and W. Zhou. Mark-aided distributed filtering by using neural network for DDoS defense. Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE, 3.Google ScholarGoogle Scholar
  28. Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of LNCS, May 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Simulating low-latency anonymous networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SpringSim '09: Proceedings of the 2009 Spring Simulation Multiconference
            March 2009
            965 pages

            Publisher

            Society for Computer Simulation International

            San Diego, CA, United States

            Publication History

            • Published: 22 March 2009

            Check for updates

            Qualifiers

            • research-article
          • Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader