skip to main content
10.1145/2382196.2382209acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Routing around decoys

Published:16 October 2012Publication History

ABSTRACT

Decoy Routing is a new approach to Internet censorship circumvention that was recently and independently proposed at FOCI'11, USENIX Security'11 and CCS'11. Decoy routing aims to hamper nation-state level Internet censorship by having routers, rather than end hosts, relay traffic to blocked destinations. We analyze the security of these schemes against a routing capable adversary, a censoring authority that is willing to make routing decisions in response to decoy routing systems.

We explore China, Syria, Iran, and Egypt as routing capable adversaries, and evaluate several attacks that defeat the security goals of existing decoy routing proposals. In particular, we show that a routing capable adversary can enumerate the participating routers implementing these protocols; can successfully avoid sending traffic along routes containing these routers with little or no adverse effects; can identify users of these schemes through active and passive attacks; and in some cases can probabilistically identify connections to targeted destinations.

References

  1. Knock Knock Knockin' on Bridges' Doors. https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors.Google ScholarGoogle Scholar
  2. CAIDA AS relationship dataset. http://www.caida.org/data/active/as-relationships/index.xml.Google ScholarGoogle Scholar
  3. JAP: The JAP anonymity & privacy homepage. http://www.anon-online.de.Google ScholarGoogle Scholar
  4. New blocking activity from iran, Sep, 14, 2011. https://blog.torproject.org/blog/iran-blocks-tor-tor-releases-same-day-fix.Google ScholarGoogle Scholar
  5. A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of the 4th International Workshop on Information Hiding, IHW '01, pages 245--257. Springer-Verlag, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Berkman Center for Internet & Society. Mapping local internet control. http://cyber.law.harvard.edu/netmaps/geo_map_home.php.Google ScholarGoogle Scholar
  7. U. I. Corporation. Ultrasurf - proxy-based internet privacy and security tools. http://ultrasurf.us.Google ScholarGoogle Scholar
  8. T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), Aug. 2008. Updated by RFCs 5746, 5878, 6176.Google ScholarGoogle Scholar
  9. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proceedings of the 13th conference on USENIX Security Symposium, pages 21--21. USENIX Association, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, May 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Edman and P. Syverson. As-awareness in tor path selection. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Feamster and R. Dingledine. Location diversity in anonymity networks. In Proceedings of the 2004 ACM workshop on Privacy in the electronic society, WPES '04, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Gao and J. Rexford. Stable internet routing without global coordination. IEEE/ACM Transactions on Networking (TON), 9(6):681--692, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Y. He, M. Faloutsos, and S. Krishnamurthy. Quantifying routing asymmetry in the internet at the as level. In Global Telecommunications Conference, 2004, volume 3 of GLOBECOM '04, pages 1474--1479. IEEE, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  15. D. Herrmann, R. Wendolsky, and H. Federrath. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier. In Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09), pages 31--42, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Hintz. Fingerprinting websites using traffic analysis. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Hopper, E. Y. Vasserman, and E. Chan-tin. How much anonymity does network latency leak. In Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Houmansadr, G. T. Nguyen, M. Caesar, and N. Borisov. Cirripede: circumvention infrastructure using router redirection with plausible deniability. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer. Decoy routing: Toward unblockable internet communication. In Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2011.Google ScholarGoogle Scholar
  20. Z. Mao, L. Qiu, J. Wang, and Y. Zhang. On as-level path inference. In ACM SIGMETRICS Performance Evaluation Review, volume 33, pages 339--349. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. J. Murdoch and P. Zielinski. Sampled traffic analysis by internet-exchange-level adversaries. In Proceedings of the 7th international conference on Privacy enhancing technologies, PET'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Panchenko, L. Niessen, A. Zinnen, and T. Engel. Website fingerprinting in onion routing based anonymization networks. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Postel. Transmission Control Protocol. RFC 793 (Standard), Sept. 1981. Updated by RFCs 1122, 3168, 6093, 6528.Google ScholarGoogle Scholar
  24. J. Qiu and L. Gao. As path inference by exploiting known as paths. In IEEE GLOBECOM, 2006.Google ScholarGoogle Scholar
  25. Y. Rekhter, T. Li, and S. Hares. A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard), Jan. 2006. Updated by RFC 6286.Google ScholarGoogle Scholar
  26. E. Rosen and Y. Rekhter. BGP/MPLS IP Virtual Private Networks (VPNs). RFC 4364 (Proposed Standard), Feb. 2006. Updated by RFCs 4577, 4684, 5462.Google ScholarGoogle Scholar
  27. E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: anticensorship in the network infrastructure. In Proceedings of the 20th USENIX Conference on Security (SEC), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Routing around decoys

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
      October 2012
      1088 pages
      ISBN:9781450316514
      DOI:10.1145/2382196

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 October 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader