Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan.

Slides:



Advertisements
Similar presentations
SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
Advertisements

Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
A Survey Anonymity and Anonymous File-Sharing Tom Chothia (Joint work with Konstantinos Chatzikokolakis)
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
(4.4) Internet Protocols Layered approach to Internet Software 1.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
Xinwen Fu Anonymous Communication & Computer Forensics Computer & Network Forensics.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Privacy on the Web Gertzman Lora Krakov Lena. Why privacy? Privacy is the number one consumer issue facing the internet. An eavesdropper (server, service.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Tarzan: A Peer-to-Peer Anonymizing Network Layer Michael J. Freedman, NYU Robert Morris, MIT ACM CCS 2002
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Anonymity on the Web: Onion routing and Crowds. 2 Outline  the problem of user privacy  basic concepts of anonymous communication  MIXes  Onion routing.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Towards an Analysis of Onion Routing Security Syverson, Tsudik, Reed, and Landwehr PET 2000 Presented by: Adam Lee 1/26/2006 Syverson, Tsudik, Reed, and.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, : Adv. Network Security.
CSCI 5234 Web Security1 Privacy & Anonymity in the WWW Ch. 12, Oppliger.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Limitations of Port Knocking Software Project Presentation Paper Study – Part III Group Member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Anonymous Communication -- a brief survey
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Lecture 14: Anonymity on the Web (cont) Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Crowds: Anonymity for Web Transactions Michael Reiter and Avi Rubin 1998.
Increasing Anonymity in Crowds via Dummy Jondos By: Benjamin Winninger.
The Silk Road: An Online Marketplace
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1 Anonymous Communications CSE 5473: Network Security Lecture due to Prof. Dong Xuan Some material from Prof. Joan Feigenbaum.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Modified Onion Routing and its Proof of Concept By: Gyanranjan Hazarika.
Anonymous Communication
What's the buzz about HORNET?
Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin
Towards Measuring Anonymity
Deanonymization of Clients in Bitcoin P2P Network
Safety in Numbers: Crowds
Mobile and Wireless Networking
An Introduction to Privacy and Anonymous Communication
0x1A Great Papers in Computer Security
Free-route Mixes vs. Cascades
Anonymous Communication
Proposed Concepts All rights belong to TCNI 2007 Company Private
Anonymity Service Proposed Concepts.
Anonymous Communication
Peer-to-Peer Information Systems Week 7: Anonymity Part 2
Increasing Anonymity via Dummy Jondos in a Crowd
Contributors: Connor McCoy
Presentation transcript:

Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan

We have seen the paper ‘Crowds: Anonymity for web transactions’ by Michael K. Reiter and Aviel Rubin. Problem trying to solve: We will see particular limitations of crowds and try to propose an effective way to reduce the probability of these limitations being exploited by the attackers. We ll also look briefly at some other methods in use that provide anonymity over the web. Approach: As mentioned in the proposal, I am mainly researching paper related to crowds. Finding if other methods to counter these limitations are proposed and study them. Making a unifying report of the crowds and related works, and suggesting different ways to increase the anonymity provided by the crowds. Also, papers related to Anonymizer, TOR, Tarzan are taken into consideration.

CROWD SECURITY- ATTACKS Local Eavesdropper: With local eavesdropper, the sender anonymity is exposed as message in is not equal to message out. If the local eavesdropper collaborated with other jondos, tracking a particular message will be easy. If the attacker is lucky enough, even the receiver web server will be known. Suggested solution: If the senders send dummy messages in a random manner, the local eavesdroppers while collaborating with the other jondos, can be thrown off their trail. (the local eavesdropper will still sense that the message is sent). Maybe the dummy messages will not be directed to the web servers at all, merely the address of some other jondo is given in the destination address. As a result, the message will go in a loop to some intermediate jondo. This can also confuse the global passive adversary. (But paths are not dynamic. What to do?)

CROWD SECURITY- ATTACKS Collaborating jondos: With collaborating jondos, the main goal is to expose the sender, but they can only suspect the previous jondo, unless the sender is explicitly mentioned in the plain text. Also, as the address of the end server is known to the jondos, the end server is exposed to the attacker. Suggested solution: There can be one more layer of protection before the web servers, called as end jondos. Instead of writing the address of the end servers, the address of these jondos are mentioned in the destination addresses. The address of the end server is also added, but is encrypted by the end jondo’s public key. This jondo can decrypt the address of the end server and can forward the message. (The anonymity of end server is still threatened by local eavesdropper attacking the end jondo as it will forward the message with probability of 1 and not flip the coin)

CROWD SECURITY- ATTACKS Other types of attacks: Active attacks by collaborating jondos like changing the requests to the web server Denial of service attacks But these attacks do not affect the anonymity directly. Firewalls too pose a problem. Brief Review of improves on this related research: Anonymizer LPWA- Lucent Personalized Web Assistant TOR- The Onion Routing Tarzan : A peer to peer approach to web anonymity

Michael J. Freedman, Robert Morris. Tarzan: A Peer-to-Peer Anonymizing Network Layer. RESOURCES AND REFERENCES: