An Introduction to Privacy and Anonymous Communication

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Advertisements

Tor: The Second-Generation Onion Router
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany.
Privacy Protection In Grid Computing System Presented by Jiaying Shi.
Xinwen Fu Anonymous Communication & Computer Forensics Computer & Network Forensics.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
CSCI 5234 Web Security1 Privacy & Anonymity in the WWW Ch. 12, Oppliger.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Anonymous Communication -- a brief survey
Privacy Enhancing Technologies Spring What is Privacy? “The right to be let alone” Confidentiality Anonymity Access Control Most privacy technologies.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Lecture 14: Anonymity on the Web (cont) Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 19 PHILLIPA GILL - STONY BROOK U.
Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan.
Anonymous Health Information Exchange (HIE) Transfer with Credibility Check against Fraud through Chaum Mixes and Crowds. By: Aaron Silcott.
The Silk Road: An Online Marketplace
Onion Routing R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Chapter 9 Networking & Distributed Security (Part C)
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
1 Anonymous Communications CSE 5473: Network Security Lecture due to Prof. Dong Xuan Some material from Prof. Joan Feigenbaum.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Modified Onion Routing and its Proof of Concept By: Gyanranjan Hazarika.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Cryptography: an overview
NET 536 Network Security Firewalls and VPN
Security Outline Encryption Algorithms Authentication Protocols
Computer Data Security & Privacy
Anonymous Communication
CONTRA Camouflage of Network Traffic to Resist Attack (Intrusion Tolerance Using Masking, Redundancy and Dispersion) DARPA OASIS PI Meeting – Hilton Head.
Protocols for Anonymous Communication
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Information and Network Security
Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin
Reliable MIX Cascade Networks Through Reputation
Towards Measuring Anonymity
Privacy Through Anonymous Connection and Browsing
0x1A Great Papers in Computer Security
Anonymous Communication
Firewalls Jiang Long Spring 2002.
Cryptography: an overview
Amar B. Patel , Shushan Zhao
Outline Network characteristics that affect security
ONLINE SECURE DATA SERVICE
Anonymous Communications
Advanced Computer Networks
Protection Mechanisms in Security Management
Anonymous Communication
A Model For Network Security
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

An Introduction to Privacy and Anonymous Communication PV Rajkumar Research Scholar

Anonymous and privacy communication Outline Privacy and Traffic Analysis Anonymous Communication Onion Routing Attacks Over Anonymity Anonymous and privacy communication 11/19/2018

Privacy and Traffic Analysis - Ability to protect information about himself Traffic Analysis - Intercepting and Examining messages - Reveals identity of communicating systems - Information about size and frequency of data transfer are Identified Anonymous and privacy communication 11/19/2018

Anonymous and privacy communication Potential Threats IP Based Blocking - Hide some portion of information based on IP. It may marketing research. IP Based Cloaking - Showing different content based on IP Information Leakage - Corporate Information - Defense Information Anonymous and privacy communication 11/19/2018

Anonymous Communication Anonymity Keeping the Identity of Communicating Parties Secret Methods Broadcast Based Proxy or Series of Proxies Mix-net Anonymous and privacy communication 11/19/2018

Anonymous and privacy communication Onion Routing Basic Components - Application proxy - Onion proxy - Logically connected distributed Onion Routers (Onion Network) - Entry point - Exit point Anonymous and privacy communication 11/19/2018

Anonymous and privacy communication Onion Routing Onion Network Construction Onion Structure Anonymous and privacy communication 11/19/2018

Anonymous and privacy communication Onion Routing Anonymous Connection Establishment Generic Cell Format Anonymous and privacy communication 11/19/2018

Anonymous and privacy communication Onion Routing Commands -Padding -Create -Data -Destroy Configurations -Firewall Configuration -Remote Proxy Configuration Anonymous and privacy communication 11/19/2018

Attacks Over Anonymity Passive Attacks -Listing and Analyzing the on going traffic Active Attacks -Sending Special Cell - Marking Anonymous and privacy communication 11/19/2018

Anonymous and privacy communication References Michael, Paul and David “Anonymous Connections and Onion Routing”, IEEE Journal on Selected Areas in Communication Volume 14, No.4, May 1998 Michael K. Reiter and Aviel D. Rubin “Anonymity for Web Transactions”, ACM Transactions on Information and System Security, volume 1, pages 66–92, 1998. D Chaum. “The dining cryptographers problem: Unconditional sender and recipient untraceability.” Journal of Cryptology, Volume 1 :65–75, 1988. WWW.Anonymizer.com Anonymous and privacy communication 11/19/2018