SGER: Defending Against Passive Logging Attacks in Anonymous Communications

Matthew Wright

Communicating over the Internet, even with encryption, exposes valuable information about with whom and how often one communicates. For organizations such as the military, government, and multinational corporations, this can be an enormous risk. Anonymous communications is a technology that can stop this kind of information leakage by mixing different traffic together as it goes through the Internet. Current systems, however, are vulnerable to long-term passive attacks, in which eavesdroppers or malicious operators can uncover the traffic patterns.

This exploratory research will examine potential solutions to these attacks. It will use in-depth simulations to explore defenses against timing analysis, by which the attacker uses the timings of messages to trace a user's traffic through the network. Attacks on longer-term traffic patterns will be combatted in two ways, both of which will be evaluated with analysis and simulation. First, ideas from peer-to-peer file-sharing systems will be used to secure the process of selecting nodes. Second, artificially-generated traffic based on other users' patterns will make it more difficult to single users out. Additionally, a testbed for exploring these ideas through experimentation will be constructed. The work will be at the forefront of creating a new, more secure generation of anonymous communications systems.

Agency
National Science Foundation (NSF)
Institute
Division of Computer and Network Systems (CNS)
Type
Standard Grant (Standard)
Application #
0549998
Program Officer
Karl Levitt
Project Start
Project End
Budget Start
2006-01-01
Budget End
2007-06-30
Support Year
Fiscal Year
2005
Total Cost
$98,118
Indirect Cost
Name
University of Texas at Arlington
Department
Type
DUNS #
City
Arlington
State
TX
Country
United States
Zip Code
76019