浏览全部资源
扫码关注微信
江苏大学计算机科学与通信工程学院,江苏 镇江 212013
[ "赵蕙(1979- ),女,江苏镇江人,江苏大学博士生,主要研究方向为网络安全、隐私保护。" ]
[ "王良民(1977- ),男,安徽潜山人,博士,江苏大学教授、博士生导师,主要研究方向为密码学与安全协议、物联网安全、大数据安全。" ]
网络出版日期:2019-10,
纸质出版日期:2019-10-25
移动端阅览
赵蕙, 王良民. 基于SDN节点淆乱机制的接收方不可追踪的混合匿名通道[J]. 通信学报, 2019,40(10):55-66.
Hui ZHAO, Liangmin WANG. Hybrid anonymous channel for recipient untraceability via SDN-based node obfuscation scheme[J]. Journal on communications, 2019, 40(10): 55-66.
赵蕙, 王良民. 基于SDN节点淆乱机制的接收方不可追踪的混合匿名通道[J]. 通信学报, 2019,40(10):55-66. DOI: 10.11959/j.issn.1000-436x.2019155.
Hui ZHAO, Liangmin WANG. Hybrid anonymous channel for recipient untraceability via SDN-based node obfuscation scheme[J]. Journal on communications, 2019, 40(10): 55-66. DOI: 10.11959/j.issn.1000-436x.2019155.
针对以Tor为代表的匿名通信系统在时延和下载时间方面的用户体验不够理想的问题,利用新一代软件定义网络带来的优势,面向接收方不可追踪,设计了新的匿名解决方案。提出使用 SDN 域内淆乱的方法,构建基于Tor和SDN的混合匿名通道,提供发送方和接收方匿名,拓展了Tor匿名通道的纵深,有效降低了攻击者对匿名路径的追踪率。实验结果表明,相比Tor,所提方案在增加15%时延的代价下,可提供相当于2条Tor电路的抗追踪能力。
Leveraging the advantages of software defined networking (SDN)
a new anonymous communication solution was de-signed for recipient untraceability.An obfuscation scheme in SDN domain was proposed to build a hybrid anonymous channel to solve the problem of large and highly variable delays and download time when using existing anonymous com-munication system such as Tor.The hybrid anonymous channel concatenated two sender anonymous channels in Tor and SDN to provide both sender and receiver anonymity.Adversaries can trace smaller portions of the path in hybrid channel.Experimental results show that the hybrid channel is as anonymous as two connected Tor circuits
with only a small larger latency (15%) compared with Tor.
ALSABAH M , GOLDBERG I . Performance and security improvements for Tor:a survey [J ] . ACM Computing Surveys , 2016 , 49 ( 2 ): 1 - 36 .
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router [C ] // The 13th USENIX Security Symposium . USENIX , 2004 : 1 - 18 .
BOYAN J . The anonymizer:protecting user privacy on the Web [J ] . Computer-Mediated Communication , 1997 , 4 ( 9 ): 1 - 6 .
HERRMANN M , GROTHOFF C . Privacy-implications of performance-based peer selection by onion-routers:a real-world case study using I2P [C ] // International Symposium on Privacy Enhancing Technologies Symposium . Springer , 2011 : 155 - 174 .
BERTHOLD O , FEDERRATH H , KÖPSELL , et al . Web MIXes:a system for anonymous and unobservable Internet access [C ] // International Workshop on Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Unobservability . Springer , 2000 : 115 - 129 .
CLARKE I , SANDBERG O , WILEY B . Freenet:a distributed anonymous information storage and retrieval system [C ] // International Workshop on Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Unobservability . Springer , 2000 : 44 - 66 .
LING Z , LUO J , WU K . TorWard:discovery,blocking,and traceback of malicious traffic over tor [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 12 ): 2515 - 2530 .
RAYMOND J F , . Traffic analysis:protocols,attacks,design issues,and open problems [M ] // Designing Privacy Enhancing Technologies . Berlin Heidelberg:Springer , 2001 : 10 - 29 .
WANG T , GOLDBERG I . On realistically attacking tor with website fingerprinting [J ] . Proceedings on Privacy Enhancing Technologies , 2016 ( 4 ): 21 - 36 .
BIRYUKOV A , KHOVRATOVICH D , PUSTOGAROV I . Deanonymisation of clients in Bitcoin P2P network [C ] // ACM SIGSAC Conference on Computer and Communications Security . ACM , 2014 : 15 - 29 .
黄韬 , 刘江 , 张晨 , 等 . 基于 SDN 的网络试验床综述 [J ] . 通信学报 , 2018 , 39 ( 6 ): 155 - 168 .
HUANG T , LIU J , ZHANG C , et al Survey on SDN-based network testbeds [J ] . Journal on Communications , 2018 , 39 ( 6 ): 155 - 168 .
CHAUM D L . Untraceable electronic mail,return addresses and digital pseudonyms [J ] . Communication of the ACM , 1981 , 24 ( 2 ): 84 - 88 .
EDMAN M , YENE R , BÜLEN T . On anonymity in an electronic society:a survey of anonymous communication systems [J ] . ACM Computing Surveys , 2009 , 42 ( 1 ): 1 - 35 .
KELLY D , RAINES R , BALDWIN R , et al . Exploring extant and emerging issues in anonymous networks:a taxonomy and survey of protocols and metrics [J ] . IEEE Communications Surveys & Tutorials , 2012 , 14 ( 2 ): 579 - 606 .
KWON A , LAZAR D , DEVADAS S . Riffle:an efficient communication system with strong anonymity [J ] . Proceedings on Privacy Enhancing Technologies , 2016 ( 2 ): 115 - 134 .
LEBLOND S , CHOFFNES D , ZHOU W . Towards efficient traffic analysis resistant anonymity networks [J ] . ACM SIGCOMM Computer Communication Review , 2013 , 43 ( 4 ): 303 - 314 .
BLOND S L , CHOFFNES D , CALDWELL W . Herd:a scalable,traffic analysis resistant anonymity network for VoIP systems [C ] // The 2015 ACM Conference . ACM , 2015 : 639 - 652 .
CHEN C . Infrastructure-based anonymous communication protocols in future internet architectures [D ] . Pittsburgh:Carnegie Mellon University , 2018 .
SANKEY J , WRIGHT M . Dovetail:stronger anonymity in next generation internet routing [C ] // International Symposium on Privacy Enhancing Technologies Symposium . Springer , 2014 : 283 - 303 .
CHEN C , ASONI D E , BARRERA D . HORNET:high-speed onion routing at the network layer [C ] // The 22nd ACM SIGSAC Conference on Computer and Communications Security . ACM , 2015 : 1441 - 1454 .
CHEN C , PERRIG A . PHI:path-hidden lightweight anonymity protocol at network layer [J ] . Proceedings on Privacy Enhancing Technologies , 2017 ( 1 ): 1 - 18 .
CHEN C , DANIELE E , DANEZIS G . TARANET:traffic analysis resistant anonymity at the network layer [C ] // IEEE European Symposium on Security and Privacy . IEEE , 2018 : 137 - 152 .
王啸 , 方滨兴 , 刘培朋 , 等 . Tor匿名通信网络节点家族的测量与分析 [J ] . 通信学报 , 2015 , 36 ( 2 ): 80 - 87 .
WANG X , FANG B X , LIU P P , et al . Measuring and analyzing node families in the Tor anonymous communication network [J ] . Journal on Communications , 2015 , 36 ( 2 ): 80 - 87 .
BAUER K , MCCOY D , GRUNWALD D , et al . Low-resource routing attacks against tor [C ] // Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society . ACM , 2007 : 11 - 20 .
潘吴斌 , 程光 , 郭晓军 , 等 . 网络加密流量识别研究综述及展望 [J ] . 通信学报 , 2016 , 37 ( 9 ): 154 - 167 .
PAN W B , CHENG G , GUO X J , et al . Review and perspective on encrypted traffic identification research [J ] . Journal on Communications , 2016 , 37 ( 9 ): 154 - 167 .
CHAKRAVARTY S , BARBERA M V , PORTOKALIDIS G . On the effectiveness of traffic analysis against anonymity networks using flow records [C ] // International Conference on Passive and Active Network Measurement . Springer , 2014 : 247 - 257 .
LING Z , LUO J , YU W , et al . Protocol-level attacks against Tor [J ] . Computer Networks , 2013 , 57 ( 4 ): 869 - 886 .
KWON A , ALSABAH M , LAZAR D . Circuit fingerprinting attacks:passive deanonymization of tor hidden services [C ] // USENIX Conference on Security Symposium . USENIX Association , 2015 : 287 - 302 .
ZHU T , FENG D , WANG F . Efficient anonymous communication in sdn-based data center networks [J ] . IEEE/ACM Transactions on Networking , 2017 , 25 ( 6 ): 3767 - 3780 .
MEIER R , GUGELMANN D , VANBEVER L . iTAP:in-network traffic analysis prevention using software-defined networks [C ] // The Symposium on SDN Research . ACM , 2017 : 102 - 114 .
TATLICIOGLU S , CIVANLAR S , GORKEMLI B . A security services platform for software defined networks [C ] // IEEE Conference on Network Function Virtualization and Software Defined Networks . IEEE , 2016 : 39 - 43 .
JAFARIAN J H , AL-SHAER E , DUAN Q . OpenFlow random host mutation:transparent moving target defense using software defined networking [C ] // ACM SIGCOMM Workshop on Hot Topics in Software Defined Networks . ACM , 2012 : 127 - 132 .
MACFARLAND D C , SHUE C A . The SDN shuffle:creating a moving-target defense using host-based software-defined networking [C ] // The 2th ACM Workshop on Moving Target Defense . ACM , 2015 : 37 - 41 .
SKOWYRA R , BAUER K , DEDHIA V . No PHEAR:networks without identifiers [C ] // The 3th ACM Workshop on Moving Target Defense . ACM , 2016 : 3 - 14 .
SILVA E G D , KNOB L A D , WICKBOLDT J A . Capitalizing on SDN-based SCADA systems:an anti-eavesdropping case-study [C ] // IFIP/IEEE International Symposium on Integrated Network Management . IEEE , 2015 : 165 - 173 .
LING Z , LUO J , WU K . Protocol-level hidden server discovery [C ] // The 32th IEEE International Conference on Computer Communications . IEEE , 2013 : 1043 - 1051 .
KONG J J , HONG X Y . ANODR:anonymous on demand routing with untraceable routes for mobile ad-hoc networks [C ] // International Symposium on Mobile Ad Hoc Networking and Computing . ACM , 2003 : 291 - 302 .
SAKAI K , SUN M T , KU W S . Performance and security analyses of onion-based anonymous routing for delay tolerant networks [J ] . IEEE Transactions on Mobile Computing , 2017 , 16 ( 12 ): 3473 - 3487 .
WIRTZ G , SANDMANN W , LOESING K . Performance measurements and statistics of tor hidden services [C ] // International Symposium on Applications and the Internet . IEEE , 2008 : 1 - 7 .
0
浏览量
667
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构