Achieving Dynamic Communication Path for Anti-Tracking Network

The increasingly rampant network monitoring and tracing bring the huge challenge on the protection of netizens' privacy. The anonymous networks mitigate the threat of network monitoring and tracing to a certain degree, but the static communication path has become the weakness. To address the problem, we propose a tracking-resistant communication mechanism with dynamic paths(TresMep). Different with the stepping stone chain like Tor, TresMep provides a chain of node groups which include at least one honest node. The message is transferred between groups. Each group uses asynchronous DC-net to hide the exit node which deliver the message to the honest node of the next group, and each group randomly chooses the exit node in each round of transmission through lagrange interpolation. Then, the transmission path would be changed dynamically and randomly to provide stronger tracking-resistance. The experimental results show that TresMep has a stronger performance of trackingresistance than the stepping stones based anti-tracking network with static communication path. The communication efficiency of TresMep is also satisfactory. But when message load is big, the communication efficiency of TresMep becomes worse. TresMep takes a tradeoff between tracking- resistance and communication efficiency.

[1]  Torsten Braun,et al.  A flow trace generator using graph-based traffic classification techniques , 2010, IWCMC.

[2]  Aniket Kate,et al.  Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two , 2017, 2018 IEEE Symposium on Security and Privacy (SP).

[3]  David Wolinsky,et al.  Dissent in Numbers: Making Strong Anonymity Scale , 2012, OSDI.

[4]  Prateek Mittal,et al.  BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.

[5]  Mohammad Sadeq Dousti,et al.  An Efficient DC-Net Based Anonymous Message Transmission Protocol , 2009 .

[6]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[7]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[8]  Nick Feamster,et al.  Identifying and Characterizing Sybils in the Tor Network , 2016, USENIX Security Symposium.

[9]  Radu State,et al.  BotTrack: Tracking Botnets Using NetFlow and PageRank , 2011, Networking.

[10]  Nasir D. Memon,et al.  Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts , 2010, ACSAC '10.

[11]  Rafail Ostrovsky,et al.  Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority , 2012, CRYPTO.

[12]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[13]  Björn Scheuermann,et al.  The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network , 2014, NDSS.

[14]  Ming Yang,et al.  De-anonymizing and countermeasures in anonymous communication networks , 2015, IEEE Communications Magazine.

[15]  Michael Backes,et al.  A Survey on Routing in Anonymous Communication Protocols , 2016, ACM Comput. Surv..

[16]  Bryan Ford,et al.  Dissent: accountable anonymous group messaging , 2010, CCS '10.

[17]  Micah Sherr,et al.  Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.

[18]  Prateek Mittal,et al.  RAPTOR: Routing Attacks on Privacy in Tor , 2015, USENIX Security Symposium.

[19]  George Danezis,et al.  PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks , 2014, CCS.

[20]  Andriy Panchenko,et al.  Practical anonymous communication on the mobile internet using Tor , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[21]  Srinivas Devadas,et al.  Riffle: An Efficient Communication System With Strong Anonymity , 2016, Proc. Priv. Enhancing Technol..

[22]  Yongzheng Zhang,et al.  AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[23]  Amir Herzberg,et al.  Spying in the Dark: TCP and Tor Traffic Analysis , 2012, Privacy Enhancing Technologies.