Filters








10 Hits in 4.3 sec

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer [article]

Chen Chen and Daniele E. Asoni, and Adrian Perrig, and David Barrera, and George Danezis, Carmela Troncoso
2018 arXiv   pre-print
We propose TARANET, an anonymity system that implements protection against traffic analysis at the network layer, and limits the incurred latency and overhead.  ...  Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.  ...  We also appreciate the insightful discussion with the members of ETH Zurich Network Security group.  ... 
arXiv:1802.08415v1 fatcat:ar4djgpzv5aa7gimwhtcfzdny4

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer

Chen Chen, Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso
2018 2018 IEEE European Symposium on Security and Privacy (EuroS&P)  
We propose TARANET, an anonymity system that implements protection against traffic analysis at the network layer, and limits the incurred latency and overhead.  ...  Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.  ...  We also appreciate the insightful discussion with the members of ETH Zurich Network Security group.  ... 
doi:10.1109/eurosp.2018.00018 dblp:conf/eurosp/0013APBDT18 fatcat:g2lojgeln5c5zctwdatxhdkrqa

Breaking and (Partially) Fixing Provably Secure Onion Routing

Christiane Kuhn, Martin Beck, Thorsten Strufe
2020 2020 IEEE Symposium on Security and Privacy (SP)  
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt at rigorous analysis, defined an ideal functionality in the universal composability model, together with properties  ...  We discover a previously unknown vulnerability that breaks anonymity completely, and explain a known one. Both should not exist if privacy is proven correctly.  ...  ACKNOWLEDGMENT We thank our shepherd Ian Goldberg and the anonymous reviewers for their very valuable feedback. This work in part was funded by DFG EXC 2050/1 -ID 390696704.  ... 
doi:10.1109/sp40000.2020.00039 dblp:conf/sp/KuhnBS20 fatcat:uhq6fp7wencahfkmjb7iw2bb7e

A Traffic Splitting Algorithm for Load Balancing in Tor

Xiance Meng, Mangui Liang
2022 Entropy  
Compared with other multipath anonymous communication networks, our proposed method can provide better anonymity.  ...  As the most popular anonymous communication system, Tor provides anonymous protection for users by sending their messages through a series of relays.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e24060807 pmid:35741528 pmcid:PMC9223355 fatcat:fhy562vzsjan3n56wob52yuq4e

Breaking and (Partially) Fixing Provably Secure Onion Routing [article]

Christiane Kuhn, Martin Beck, Thorsten Strufe
2019 arXiv   pre-print
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt at rigorous analysis, defined an ideal functionality in the universal composability model, together with properties  ...  We discover a previously unknown vulnerability that breaks anonymity completely, and explain a known one. Both should not exist if privacy is proven correctly.  ...  ACKNOWLEDGMENT We thank our shepherd Ian Goldberg and the anonymous reviewers for their very valuable feedback. This work in part was funded by DFG EXC 2050/1 -ID 390696704.  ... 
arXiv:1910.13772v1 fatcat:jgi2arw5lrea5kjwqn3uhrlppa

PriFi: Low-Latency Anonymity for Organizational Networks [article]

Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Jean-Pierre Hubaux, Joan Feigenbaum
2021 arXiv   pre-print
We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdroppers and provides high-performance traffic-analysis resistance.  ...  Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used.  ...  Taranet provides traffic-analysis resistance through traffic shaping [9] . 0.48em Mix Networks.  ... 
arXiv:1710.10237v9 fatcat:ico7au4cyfbmrhrivhu6ik36hu

PriFi: Low-Latency Anonymity for Organizational Networks

Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Joan Feigenbaum, Jean-Pierre Hubaux
2020 Proceedings on Privacy Enhancing Technologies  
against eavesdroppers and provides high-performance traffic-analysis resistance.  ...  usual network path without additional hops, and in which a set of remote servers assist the anonymization process without adding latency.  ...  Taranet provides traffic-analysis resistance through traffic shaping [12] . Ricochet [7] and Pond [45] are messaging systems that build on Tor. Mix Networks.  ... 
doi:10.2478/popets-2020-0061 fatcat:a2gsonuuafbshb6rmbtm2csa3q

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware

Eva Papadogiannaki, Sotiris Ioannidis
2021 Sensors  
Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI).  ...  However, encryption can be exploited to hide malicious activities, camouflaged into normal network traffic.  ...  Acknowledgments : The authors would like to thank the anonymous reviewers and the editor.  ... 
doi:10.3390/s21041140 pmid:33562000 fatcat:cfsytoioujeohglyusbem76ygy

Infrastructure-based Anonymous Communication Protocols in Future Internet Architectures

Chen Chen
2018
We propose TARANET, an anonymity system that implements protection against traffic analysisat the network layer, and limits the incurred latency and overhead.  ...  In TARANET's setup phase,traffic analysis is thwarted by mixing. In the da [...]  ...  Chapter 5 TARANET: Traffic-Analysis Resistant Anonymity Protocol at the Network Layer In this chapter, we propose TARANET, a scalable, high-speed, and traffic-analysis-resistant anonymous communication  ... 
doi:10.1184/r1/7212494 fatcat:gmeythrhr5acxjl2i4nh2kyice

How Lightning's Routing Diminishes its Anonymity [article]

Satwik Prabhu Kumble, Dick Epema, Stefanie Roos
2021 pre-print
The system shows the error of "Bad character(s) in field Abstract" for no reason. Please refer to manuscript for the full abstract  ...  ACKNOWLEDGMENTS The work was partially supported by Ripple's University Blockchain Research Initiative and the Distributed ASCI Supercomputer (DAS) was used for experiments.  ...  Concretely, Taranet suggests re-ordering of traffic and the insertion of dummy traffic [5] .  ... 
doi:10.1145/3465481.3465761 arXiv:2107.10070v1 fatcat:p2dkslvrv5bivio5eyo2d3gxs4