skip to main content
article

The predecessor attack: An analysis of a threat to anonymous communications systems

Published:11 November 2004Publication History
Skip Abstract Section

Abstract

There have been a number of protocols proposed for anonymous network communication. In this paper, we investigate attacks by corrupt group members that degrade the anonymity of each protocol over time. We prove that when a particular initiator continues communication with a particular responder across path reformations, existing protocols are subject to the attack. We use this result to place an upper bound on how long existing protocols, including Crowds, Onion Routing, Hordes, Web Mixes, and DC-Net, can maintain anonymity in the face of the attacks described. This provides a basis for comparing these protocols against each other. Our results show that fully connected DC-Net is the most resilient to these attacks, but it suffers from scalability issues that keep anonymity group sizes small. We also show through simulation that the underlying topography of the DC-Net affects the resilience of the protocol: as the number of neighbors a node has increases the strength of the protocol increases, at the cost of higher communication overhead.

References

  1. Berthold, O., Federrath, H., and Kohntopp, M. 2000. Project anonymity and unobservability in the internet. In Computers Freedom and Privacy Conference 2000 (CFP 2000) Workshop on Freedom and Privacy by Design.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bertsekas, D. and Gallager, R. 1987. Data Networks. Prentice-Hall, Englewood Cliffs, NJ.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (Feb.), 84--88.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chaum, D. 1988. The dining cryptographers problem: Unconditional sender and receipient untraceability. J. Cryptography 1, 1, 65--75.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Figueiredo, D. R., Nain, P., and Towsley, D. 2004. On the analysis of the predecessor attack on anonymous protocols. Technical Report 04-65 (July), University of Massachusetts CMPSCI.]]Google ScholarGoogle Scholar
  6. Freedman, M. J. and Morris, R. 2002. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of ACM Conference on Computer and Communications Security (CCS 2002).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Goldberg, I. and Wagner, D. 1998. Taz servers and the rewebber network: Enabling anonymous publishing on the world wide web. First Monday.]]Google ScholarGoogle Scholar
  8. Harmon, A. 1998. Exploration of the world wide web tilts from eclectic to mundane. New York Times (Aug. 26). National Desk.]]Google ScholarGoogle Scholar
  9. Kesdogan, D., Egner, J., and Buschkes, R. 1998. Stop-and-go-mixes providing probabilistic anonymity in an open system. In Information Hiding.]]Google ScholarGoogle Scholar
  10. Kung, H. T., Bradner, S., and Tan, K.-S. 2002. An ip-layer anonymizing infrastructure. In Proceedings of MILCOM: Military Communications Conference.]]Google ScholarGoogle Scholar
  11. Levine, B. N., Reiter, M., Wang, C., and Wright, M. 2004. Stopping timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography.]]Google ScholarGoogle Scholar
  12. Martin, D. 1999. Local Anonymity in the Internet. Ph.D Thesis, Boston, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Motawani, R. and Raghavan, P. 1995. Randomized Algorithms. Cambridge University Press, Cambridge, UK, chap. 4.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pfitzmann, A., Pfitzmann, B., and Waidner, M. 1991. Isdnmixes: Untraceable communication with very small bandwidth overhead. In GI/ITG Conference: Communication in Distributed Systems.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Reed, M., Syverson, P., and Goldschlag, D. 1998. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communication. Special Issue on Copyright and Privacy Protection.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Reiter, M. K. and Rubin, A. D. 1998. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1, 1 (Nov.), 66--92.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Rennhard, M. and Plattner, B. 2002. Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection. In Proceedings of 2002 ACM Workshop on Privacy in the Electronic Society (WPES).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Scarlatta, V., Levine, B., and Shields, C. 2001. Responder anonymity and anonymous peer-to-peer file sharing. In Proceedings of IEEE International Conference on Network Protocols (ICNP).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Schneier, B. 1996. Applied Cryptography. Wiley, New York.]]Google ScholarGoogle Scholar
  20. Sherwood, R., Bhattacharjee, B., and Srinivasan, A. 2002. P5: A protocol for scalable anonymous communication. In Proceedings of 2002 IEEE Symposium on Security and Privacy.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Shields, C. and Levine, B. 2000. A Protocol for anonymous communication over the internet. In Proceedings of 7th ACM Conference on Computer and Communication Security (ACM CCS 2000).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Shmatikov, V. 2002. Probabilistic analysis of anonymity. In IEEE Computer Security Foundations Workshop (CSFW). 119--128.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Staniford-Chen, S. and Heberlein, L. 1995. Holding intruders accountable on the internet. In Proceedings of the 1995 IEEE Symposium on Security and Privacy (Oakland, CA). 39--49.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Syverson, P. and Stubblebine, S. 1999. Group principals and the formalization of anonymity. In FM'99---Formal Methods, vol. I, J. Wing, J. Woodcock, and J. Davies, Eds. Lecture Notes in Computer Science, vol. 1708. Springer, Berlin, 814--833.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Syverson, P., Tsudik, G., Reed, M., and Landwehr, C. 2000. Towards an analysis of onion routing security. In Workshop on Design Issues in Anonymity and Unobservability.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Waidner, M. and Pfitzmann, B. 1989a. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In Eurocrypt '89.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Waidner, M. and Pfitzmann, B. 1989b. Unconditional sender and recipient untraceability in spite of active attacks---Some remarks. Technical Report, Fakultat fur Informatik, Universitat Karlsruhe.]]Google ScholarGoogle Scholar
  28. Wright, M., Adler, M., Levine, B., and Shields, C. 2002. An analysis of the degradation of anonymous protocols. In ISOC Symposium on Network and Distributed System Security.]]Google ScholarGoogle Scholar
  29. Wright, M., Adler, M., Levine, B., and Shields, C. 2003. Defending anonymous communications against passive logging attacks. In IEEE Symposium on Security and Privacy.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Xiao, L., Xu, Z., and Zhang, X. 2001. Low-cost and reliable mutual anonymity protocols in peer-to-peer networks. Technical Report HPL-2001-204 (Aug.), Hewlett Packard Laboratories.]]Google ScholarGoogle Scholar
  31. Yoda, K. and Etoh, H. 2000. Finding a connection chain for tracing intruders. In Proceedings of the 6th European Symposium on Research in Computer Security (2000). ESORICS.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Zhang, Y. and Paxson, V. 1999. Stepping stone detection. A Presentation at SIGCOMM'99, New Areas of Research.]]Google ScholarGoogle Scholar

Index Terms

  1. The predecessor attack: An analysis of a threat to anonymous communications systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Information and System Security
      ACM Transactions on Information and System Security  Volume 7, Issue 4
      November 2004
      139 pages
      ISSN:1094-9224
      EISSN:1557-7406
      DOI:10.1145/1042031
      Issue’s Table of Contents

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 November 2004
      Published in tissec Volume 7, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader