On Flow Marking Attacks in Wireless Anonymous Communication Networks

This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks into wireless traffic flows by electromagnetic interference. We find that traditional mix technologies are not effective in defeating flow marking attacks, and it may take an adversary only a few seconds to recognize the communication relationship between hosts by tracking such artificial marks. Flow marking attacks utilize frequency domain analytical techniques and convert time domain marks into invariant feature frequencies. To counter flow marking attacks, we propose a new countermeasure based on digital filtering technology, and show that this filter-based countermeasure can effectively defend a wireless mix network from flow marking attacks

[1]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Riccardo Bettati,et al.  Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures , 2004, Information Hiding.

[3]  Stephen A. Dyer,et al.  Digital signal processing , 2018, 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004..

[4]  Gene Tsudik,et al.  Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[5]  T. Hughes,et al.  Signals and systems , 2006, Genome Biology.

[6]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[7]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[8]  Fouad A. Tobagi,et al.  Packet-level traffic measurements from a tier-1 ip backbone , 2001 .

[9]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[10]  Walter Willinger,et al.  Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.

[11]  J. Broch,et al.  Dynamic source routing in ad hoc wireless networks , 1998 .

[12]  A. Kuzmanovic,et al.  Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants , 2003, SIGCOMM '03.

[13]  Aleksandar Kuzmanovic,et al.  Low-rate TCP-targeted denial of service attacks and counter strategies , 2003, IEEE/ACM Transactions on Networking.

[14]  Micah Adler,et al.  Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..

[15]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[16]  U Moeller,et al.  Mixmaster Protocol Version 2 , 2004 .

[17]  Donald F. Towsley,et al.  Modeling TCP throughput: a simple model and its empirical validation , 1998, SIGCOMM '98.

[18]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[19]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[20]  Peter Sewell,et al.  Passive Attack Analysis for Connection-Based Anonymity Systems , 2003, ESORICS.

[21]  Jean Tourrilhes,et al.  Co-link configuration: using wireless diversity for more than just connectivity , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[22]  P. J. Green,et al.  Density Estimation for Statistics and Data Analysis , 1987 .

[23]  Theodore S. Rappaport,et al.  Wireless position location: fundamentals, implementation strategies, and sources of error , 1997, 1997 IEEE 47th Vehicular Technology Conference. Technology in Motion.

[24]  George Danezis,et al.  Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..

[25]  Dawn Xiaodong Song,et al.  Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.

[26]  David G. Stork,et al.  Pattern Classification , 1973 .

[27]  Susan A. Murphy,et al.  Monographs on statistics and applied probability , 1990 .

[28]  Anton Stiglic,et al.  Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.

[29]  Robert C. Dixon,et al.  Spread‐spectrum systems , 1976 .

[30]  Mark Carson,et al.  NIST Net: a Linux-based network emulation tool , 2003, CCRV.

[31]  Andrew Hintz,et al.  Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.

[32]  Jean-François Raymond,et al.  Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[33]  Sung-Ju Lee,et al.  Wireless Ad Hoc Multicast Routing with Mobility Prediction , 2001, Mob. Networks Appl..

[34]  Micah Adler,et al.  An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.

[35]  Matthew K. Wright,et al.  Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.

[36]  Khosrow Dehnad,et al.  Density Estimation for Statistics and Data Analysis , 1987 .

[37]  Cem U. Saraydar,et al.  Paging area optimization based on interval estimation in wireless personal communication networks , 2000, Mob. Networks Appl..

[38]  Riccardo Bettati,et al.  On Flow Correlation Attacks and Countermeasures in Mix Networks , 2004, Privacy Enhancing Technologies.

[39]  Roger Dingledine,et al.  From a Trickle to a Flood: Active Attacks on Several Mix Types , 2002, Information Hiding.

[40]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[41]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[42]  kc claffy,et al.  Longitudinal study of Internet traffic in 1998-2003 , 2004 .

[43]  Lili Qiu,et al.  Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[44]  Gerald Q. Maguire,et al.  A class of mobile motion prediction algorithms for wireless mobile computing and communications , 1996, Mob. Networks Appl..

[45]  R. Wilder,et al.  Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..

[46]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[47]  Mario Gerla,et al.  A zone routing protocol for Bluetooth scatternets , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..