An Analysis of Active Attacks on Anonymity Systems

Network security in the traditional sense consists of the following four elements: secret, integrity, availability and authenticity. Recent studies have indicated that: anonymity, as an important indicator of information security. In recent years, the research shows that: anonymity is also gradually being the important indicator of information security. With the rapid development of communication technology and the Internet, people pay more and more attention to personal privacy. As a result, the research on anonymous communication system is gradually increasing. P2P network's openness and the unpredictability of malicious nodes make the network user's privacy information more vulnerable to illegal theft. The attacker can not only get the contents of the file, but also can get the identity and other related privacy information of the sender and receiver. Anonymous technology is the best way to solve the privacy protection. Therefore, it is of important theoretical significance and application value to study the anonymous technology in P2P network environment. However, with the development of anonymous technology, P2P network attack technology has become the focus of research. This paper mainly analyzes the typical active attack technology.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Brian Neil Levine,et al.  Quantifying Resistance to the Sybil Attack , 2008, Financial Cryptography.

[3]  Nikita Borisov,et al.  Securing Anonymous Communication Channels under the Selective DoS Attack , 2013, Financial Cryptography.

[4]  Riccardo Bettati,et al.  On Flow Marking Attacks in Wireless Anonymous Communication Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[5]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[6]  Björn Scheuermann,et al.  The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network , 2014, NDSS.

[7]  Hannes Hartenstein,et al.  Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[8]  Fei Wang,et al.  Adaptive membership maintenance under the sybil attack coupled with churn in P2P networks , 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science.

[9]  Dharanipragada Janakiram,et al.  SyMon: A practical approach to defend large structured P2P systems against Sybil Attack , 2011 .

[10]  Stefan Köpsell,et al.  How to achieve blocking resistance for existing systems enabling anonymous web surfing , 2004, WPES '04.

[11]  Jean-François Raymond,et al.  Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[12]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[13]  Sushil Jajodia,et al.  Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[14]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[15]  Andreas Pfitzmann,et al.  The Disadvantages of Free MIX Routes and how to Overcome Them , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[16]  George Danezis,et al.  Heartbeat Traffic to Counter (n-1) Attacks , 2004 .

[17]  Xinwen Fu,et al.  A New Replay Attack Against Anonymous Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[18]  Brian Neil Levine,et al.  Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.

[19]  Marek Klonowski,et al.  Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack , 2004, WISA.

[20]  George Danezis,et al.  Denial of service or denial of security? , 2007, CCS '07.

[21]  Dirk Grunwald,et al.  Low-resource routing attacks against tor , 2007, WPES '07.

[22]  Danny Krizanc,et al.  Detecting Denial of Service Attacks in Tor , 2009, Financial Cryptography.

[23]  Yang Li,et al.  Towards Attacks and Defenses of Anonymous Communication Systems , 2015 .