[ Pobierz całość w formacie PDF ]
shortest path routing when configured to provide near
complete anonymity against our chosen attacker, and we in-
clude mechanisms to exchange anonymity for performance.
We have demonstrated key aspects of the feasibility and
effectiveness of this direction and hope this this motivates
serious consideration of privacy as a requirement in the
development of other next-generation routing protocols.
We do not advocate an Internet without identity. Rather,
we propose that identity exposure be reserved for substan-
tial relationships and avoided for ephemeral relationships.
This research direction is still in its infancy, and much work
remains. We believe the most pressing matter is to develop
diversity in the solution space by considering how privacy-
preserving features might be integrated into other leading
layer 3 proposals. Beyond this, there are user interface
questions to explore in the provision of clear and mean-
ingful network privacy choices and in characterizing the
user response to these choices. This characterization will
provide a better understanding of the resource requirements
for network layer anonymity systems and of the motivations
for service providers. Finally, further work remains with the
Dovetail protocol. Network latency information should be
incorporated into both the path selection algorithms and the
anonymity assessments. Our evaluation should be extended
to a wider range of network assumptions and additional
privacy/performance settings.
References
[1] J. R. Mayer and J. C. Mitchell, “Third-party web tracking:
Policy and technology,” in IEEE S&P, 2012.
[2] J. Mikians, L. Gyarmati, V. Erramilli, and N. Laoutaris,
“Detecting price and search discrimination on the internet,”
in HotNets, 2012.
[3] M. Reiter and A. Rubin, “Crowds: Anonymity for web
transactions,” ACM ToISS, 1998.
[4] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The
second-generation onion router,” in USENIX Security, 2004.
[5] The Tor Project, Inc, “Tor metrics portal: Users,” https://
metrics.torproject.org/users.html, accessed: 2014-02-11.
[6] S. Paul, J. Pan, and R. Jain, “Architectures for the future net-
works and the next generation internet: A survey,” Computer
Communications, 2011.
[7] The National Science Foundation, “NSF NeTS FIND ini-
tiative,” http://www.nets-find.net/index.php, accessed: 2014-
02-11.
[8] CORDIS, “FIRE home page,” http://cordis.europa.eu/fp7/ict/
fire/home en.html, accessed: 2014-02-11.
[9] National Institute of Information and Communications Tech-
nology, “”AKARI” architecture design project for new
generation network,” http://www.nict.go.jp/en/photonic nw/
archi/akari/akari-top e.html, accessed: 2014-02-11.
[10] F. Papadopoulos, D. Krioukov, M. Bogua, and A. Vahdat,
“Greedy forwarding in dynamic scale-free networks embed-
ded in hyperbolic metric spaces,” in IEEE INFOCOM, 2010.
the internet,” IEEE/ACM ToN, 2001.
[44] V. Giotsas and S. Zhou, “Valley-free violation in internet
routing-analysis based on BGP community data,” in IEEE
ICC, 2012.
[45] P. S. Ryan and J. Gerson, “A primer on Internet exchange
points for policymakers and non-engineers,” http://ssrn.com/
abstract=2128103, Aug. 2012.
[46] A. Lodhi, A. Dhamdhere, and C. Dovrolis, “Open peering by
Internet transit providers: Peer preference or peer pressure?”
in Proc. IEEE INFOCOM, 2014.
[47] L. Lamport, “Password authentication with insecure com-
munication,” Communications of the ACM, 1981.
[48] N. Borisov, G. Danezis, P. Mittal, and P. Tabriz, “Denial of
service or denial of security?” in CCS, 2007.
[49] M. K. Wright, M. Adler, B. N. Levine, and C. Shields,
“Passive-logging attacks against anonymous communica-
tions systems,” ACM Transactions on Information and Sys-
tem Security (TISSEC), vol. 11, no. 2, 2008.
[50] S. Chen, R. Wang, X. Wang, and K. Zhang, “Side-channel
leaks in web applications: A reality today, a challenge
tomorrow,” in IEEE S&P, 2010.
[51] P. Mittal, A. Khurshid, J. Juen, M. Caesar, and N. Borisov,
“Stealthy traffic analysis of low-latency anonymous com-
munication using throughput fingerprinting,” in ACM CCS,
2011.
[52] N. Hopper, E. Y. Vasserman, and E. Chan-Tin, “How much
anonymity does network latency leak?” in ACM CCS, 2007.
[53] S. J. Murdoch and G. Danezis, “Low-cost traffic analysis of
Tor,” in IEEE S&P, 2005.
[54] N. Evans, R. Dingledine, and C. Grothoff, “A practical
congestion attack on Tor using long paths,” in USENIX
Security, 2009.
[55] A. Serjantov and G. Danezis, “Towards an information
theoretic metric for anonymity,” in PETS, 2003.
[56] CAIDA, “The CAIDA UCSD inferred AS relation-
ships - 20120601,” http://www.caida.org/data/active/as-
relationships/index.xml, 2012.
[31] P. Dampier, “‘Cable ONE spied on customers’ alleges
federal class action lawsuit,” http://stopthecap.com/2010/
02/08/cable-one-spied-on-customers-alleges-federal-class-
action-lawsuit, 2012.
[32] P. Syverson, “Why I’m not an entropist,” in Seventeenth
International Workshop on Security Protocols.
Springer,
2009.
[33] S. J. Murdoch and P. Zieliński, “Sampled traffic analysis by
Internet-exchange-level adversaries,” in PETS, 2007.
[34] E. MacAskill, J. Borger, N. Hopkins, N. Davies, and J. Ball,
“GCHQ taps fibre-optic cables for secret access to world’s
communications,”
http://www.theguardian.com/uk/2013/
jun/21/gchq-cables-secret-world-communications-nsa, June
2013.
[35] S. Staff, “Inside TAO: Documents reveal top NSA hacking
unit,”
http://www.spiegel.de/international/world/the-
nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-
networks-a-940969-3.html, Dec. 2013.
[36] J. Postel, “Internet protocol,” RFC 791, 1981. [Online].
Available: http://www.ietf.org/rfc/rfc0791.txt
[37] S. M. Bellovin, “Security problems in the TCP/IP protocol
suite,” ACM SIGCOMM CCR, 1989.
[38] Y. Rekhter, T. Li, and S. Hares, “A border gateway
protocol 4 (BGP-4),” RFC 4271, 2006. [Online]. Available:
http://tools.ietf.org/html/rfc4271
[39] J. Boyan, “The anonymizer,” Computer-Mediated Commu-
nication Magazine, 1997.
[40] P. Boucher, A. Shostack, and I. Goldberg, “Freedom systems
2.0 architecture,” Zero Knowledge Systems, Inc., White
Paper, 2000.
[41] A. Panchenko, L. Pimenidis, and J. Renner, “Performance
analysis of anonymous communication channels provided by
Tor,” in ARES, 2008.
[ Pobierz całość w formacie PDF ]
Pokrewne
- Indeks
- Anonymous Ecstasy on Fire[REB]
- Dziewica Deveraux Jude
- Cornick Nicola Przeklety dwor
- 105. Whitiker Gail Tajemnice Opactwa Steepwood 11 Akademia uczućÂ
- Best Practice Gu
- McMahon_Barbara_ _Zloty_piasek_pustyni
- Anthony, Piers Chthon 02 Phthor
- Brian W. Aldiss Zabawa w Boga Notatnik
- M026. Anderson Caroline MćÂski punkt w
- Piper Vaughn & MJ O'Shea Lucky Moon 1 Moonlight Becomes You
- zanotowane.pl
- doc.pisz.pl
- pdf.pisz.pl
- nie-szalona.pev.pl