{"title":"用多电路Tor和线性网络编码对抗审查","authors":"Anna Engelmann, A. Jukan","doi":"10.1109/CMI48017.2019.8962147","DOIUrl":null,"url":null,"abstract":"Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censorship attacks by blocking the public and secret Tor entry routers, e.g., bridges, or by jamming Tor traffic to prevent users to access Tor network. To help further evolution of anonymity networks, we focus in this work on censorship attacks, and propose to enhance the well-known multipath Tor technique with linear network coding (LNC). We analyze anonymity, privacy and censorship success considering different types of adversaries and the amount of honest and compromised components in the Tor and in the underlying network. The results show that LNC can significantly improve the robustness of Tor against censorship and maintain sufficient anonymity and privacy levels.","PeriodicalId":142770,"journal":{"name":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Defying Censorship with Multi-Circuit Tor and Linear Network Coding\",\"authors\":\"Anna Engelmann, A. Jukan\",\"doi\":\"10.1109/CMI48017.2019.8962147\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censorship attacks by blocking the public and secret Tor entry routers, e.g., bridges, or by jamming Tor traffic to prevent users to access Tor network. To help further evolution of anonymity networks, we focus in this work on censorship attacks, and propose to enhance the well-known multipath Tor technique with linear network coding (LNC). We analyze anonymity, privacy and censorship success considering different types of adversaries and the amount of honest and compromised components in the Tor and in the underlying network. The results show that LNC can significantly improve the robustness of Tor against censorship and maintain sufficient anonymity and privacy levels.\",\"PeriodicalId\":142770,\"journal\":{\"name\":\"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMI48017.2019.8962147\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 12th CMI Conference on Cybersecurity and Privacy (CMI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMI48017.2019.8962147","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defying Censorship with Multi-Circuit Tor and Linear Network Coding
Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censorship attacks by blocking the public and secret Tor entry routers, e.g., bridges, or by jamming Tor traffic to prevent users to access Tor network. To help further evolution of anonymity networks, we focus in this work on censorship attacks, and propose to enhance the well-known multipath Tor technique with linear network coding (LNC). We analyze anonymity, privacy and censorship success considering different types of adversaries and the amount of honest and compromised components in the Tor and in the underlying network. The results show that LNC can significantly improve the robustness of Tor against censorship and maintain sufficient anonymity and privacy levels.