Skip to main content

Breaking the Collusion Detection Mechanism of MorphMix

  • Conference paper
Privacy Enhancing Technologies (PET 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4258))

Included in the following conference series:

Abstract

MorphMix is a peer-to-peer circuit-based mix network designed to provide low-latency anonymous communication. MorphMix nodes incrementally construct anonymous communication tunnels based on recommendations from other nodes in the system; this P2P approach allows it to scale to millions of users. However, by allowing unknown peers to aid in tunnel construction, MorphMix is vulnerable to colluding attackers that only offer other attacking nodes in their recommendations. To avoid building corrupt tunnels, MorphMix employs a collusion detection mechanism to identify this type of misbehavior. In this paper, we challenge the assumptions of the collusion detection mechanism and demonstrate that colluding adversaries can compromise a significant fraction of all anonymous tunnels, and in some cases, a majority of all tunnels built. Our results suggest that mechanisms based solely on a node’s local knowledge of the network are not sufficient to solve the difficult problem of detecting colluding adversarial behavior in a P2P system and that more sophisticated schemes may be needed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. eDonkey File Sharing System (2003)

    Google Scholar 

  2. Berthold, O., Federrath, H., Köpsell, S.: Web MIXes: A System for Anonymous and Unobservable Internet Access. In: Workshop on Design Issues in Anonymity and Unobservability, pp. 115–129 (2000)

    Google Scholar 

  3. Bhagwan, R., Savage, S., Voelker, G.: Understanding Availability. In: 2nd International Workshop on Peer-to-Peer Systems (2003)

    Google Scholar 

  4. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  5. Cornelli, F., Damiani, E., De Capitani diVimercati, S., Paraboschi, S., Samarati, P.: Choosing Reputable Servents in a P2P Network. In: WWW, pp. 376–386 (2002)

    Google Scholar 

  6. Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proceedings of the 2003 Symposium on Security and Privacy, pp. 2–15. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  7. Daswani, N., Garcia-Molina, H.: Pong-cache poisoning in GUESS. In: 11th ACM Conference on Computer and Communications Security (2004)

    Google Scholar 

  8. Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The Second-Generation Onion Router. In: USENIX Security Symposium, pp. 303–320 (2004)

    Google Scholar 

  9. Douceur: The Sybil Attack. In: International Workshop on Peer-to-Peer Systems (IPTPS). LNCS, vol. 1, Springer, Heidelberg (1973)

    Google Scholar 

  10. Freedman, Morris: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: SIGSAC: 9th ACM Conference on Computer and Communications Security. ACM SIGSAC (2002)

    Google Scholar 

  11. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: WWW, pp. 640–651 (2003)

    Google Scholar 

  12. Levine, B.N., Shields, C.: Hordes: a Multicast-Based Protocol for Anonymity. Journal of Computer Security 10(3), 213–240 (2002)

    Google Scholar 

  13. Murdoch, S.J., Danezis, G.: Low-Cost Traffic Analysis of Tor. In: IEEE Symposium on Security and Privacy, pp. 183–195 (2005)

    Google Scholar 

  14. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks (IPSN 2004), April 26–27, pp. 259–268. ACM Press, New York (2004)

    Chapter  Google Scholar 

  15. Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web. Technical Report SIDL-WP-1999-0120, Stanford University (November 1999)

    Google Scholar 

  16. Reiter, Rubin: Crowds: Anonymity for Web Transactions. ACMTISS: ACM Transactions on Information and System Security 1 (1998)

    Google Scholar 

  17. Rennhard, M., Plattner, B.: Practical Anonymity for the Masses with MorphMix. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 233–250. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Rennhard, M.: PhD thesis, Swiss Federal Institute of Technology Zurich

    Google Scholar 

  19. Rennhard, M.: MorphMix prototype v0.1 (2004)

    Google Scholar 

  20. Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer Based Anonymous Internet Usage with Collusion Detection. In: WPES, pp. 91–102 (2002)

    Google Scholar 

  21. Walsh, K., Sirer, E.G.: Fighting Peer-to-Peer SPAM and Decoys with Object Reputation. In: Proceedings of the Third Workshop on the Economics of Peer-to-Peer Systems (P2PECON) (2005)

    Google Scholar 

  22. Zhang, Goel, Govindan, Mason, Van Roy: Making Eigenvector-Based Reputation Systems Robust to Collusion. In: Optimization Techniques 1973. LNCS, vol. 3, Springer, Heidelberg (1973)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tabriz, P., Borisov, N. (2006). Breaking the Collusion Detection Mechanism of MorphMix. In: Danezis, G., Golle, P. (eds) Privacy Enhancing Technologies. PET 2006. Lecture Notes in Computer Science, vol 4258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11957454_21

Download citation

  • DOI: https://doi.org/10.1007/11957454_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68790-0

  • Online ISBN: 978-3-540-68793-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics