[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] r1757: initial references and notes on some papers for correlation (in doc/trunk: . correlation07 pingers)



Author: nickm
Date: 2007-01-24 03:21:28 -0500 (Wed, 24 Jan 2007)
New Revision: 1757

Added:
   doc/trunk/correlation07/
   doc/trunk/correlation07/notes.txt
   doc/trunk/correlation07/traffic.bib
Modified:
   doc/trunk/
   doc/trunk/pingers/echolot.pdf
Log:
 r12026@Kushana:  nickm | 2007-01-24 03:21:20 -0500
 initial references and notes on some papers for correlation paper.  more notes tomorrow: typing from handwritten notes



Property changes on: doc/trunk
___________________________________________________________________
 svk:merge ticket from /freehaven-doc/trunk [r12026] on c95137ef-5f19-0410-b913-86e773d04f59

Added: doc/trunk/correlation07/notes.txt
===================================================================
--- doc/trunk/correlation07/notes.txt	2006-12-07 03:22:37 UTC (rev 1756)
+++ doc/trunk/correlation07/notes.txt	2007-01-24 08:21:28 UTC (rev 1757)
@@ -0,0 +1,59 @@
+
+Notes on papers in traffic.bib, with an eye to enumerating all the attacks,
+figuring out how they work, and figuring out what we don't yet know.
+
+
+Hey, authors!
+
+If you happen to be reading this and I call some aspect of your paper 'vague'
+or 'unclear', that means that I don't understand it yet.  My problem, not
+yours--but feel free to clarify for my benefit. ;)
+
+
+
+"Traffic analysis of Continuous-time mixes"
+Danezis,  PET 2004, pp. 35-50
+
+ATTACK #1: mathy.
+Uses known delay characteristics of mixes (expressed as time-invariant
+probability distribution for delay)  to compute probability distributions for
+how an input signal will look as it leaves a mix.  Compute maximum likelihood
+for output signals, given input.  Compare.
+
+ATTACK #2: In simulation: Uses click-based simulator, a confusing background
+("noise") function, and a vague source "400 packets over 10000 ticks", and an
+unclear comparison metric.  "No attempt to model the noise."
+
+Neat idea: If we have full network view and we don't know if O1 or O2 is the
+output, see if any of their inputs looks like the expected 2nd-to-last view
+of the signal.
+
+Email George to see if he still has the code here.
+
+There doesn't seem to be a numerical indication of results or level of
+success?
+
+Target system seems to be SG-like.
+
+
+"On Flow Correlation Attacks and Countermeasures in Mix Networks"
+- Zhu, Fu, Graham, Bettati, and Zhao.
+PET 2004, pp 207-225.
+
+Attack: against a mix (batch or timed).  Pool mixes are mentioned but not
+investigated.  Transform in/out streams into rates, in buckets, with each
+in/out pair corresponding to a mix firing.  Compute similarity based on
+estimated mutual information OR on an FFT/Wavelet transform plus a "Matched
+Filter Detector."
+
+Simulation: Separate one FTP stream from one (not specified AFAICT) noise
+generator. Done at packet level with TCP; not totally realistic.
+
+Matched filter seems to work better.
+
+Proposed defense: output traffic control: dummy traffic triggered by QOS
+issues.  Doesn't seem to examine overhead.
+
+Most crucial details are described in TR2003-8-9, which doesn't seem to be
+online.  Asked Riccardo for a copy on 6 Dec; no link received yet.
+

Added: doc/trunk/correlation07/traffic.bib
===================================================================
--- doc/trunk/correlation07/traffic.bib	2006-12-07 03:22:37 UTC (rev 1756)
+++ doc/trunk/correlation07/traffic.bib	2007-01-24 08:21:28 UTC (rev 1757)
@@ -0,0 +1,367 @@
+%
+%
+%   HEY YOU!
+%
+%
+%
+%   THIS IS NOT THE BIBLIOGRAPHY FOR THE PAPER!
+%
+%
+%
+%   I'm using this file to keep track of my progress working through a big
+%   list of traffic analysis papers.  Please don't add or remove any papers
+%   here!  Put them in another .bib file.
+%
+%
+%
+%      Yrs,
+%
+%        -Nick
+%
+%
+%
+%
+%
+
+@string{fp = "Fingerprinting"}
+@string{ct = "Continuous-time traffic analysis"}
+@string{unc = "Unclassified"}
+
+% HAVE SCANNED: PET2002-2006.
+%   FC2001-2005.
+%   WPES2002,2003,2005
+%   ESORICS2000,2002,2004,2005
+%   IH2002,2004,2005
+
+% GET: FC,  IEEE S&P, USENIX SECURITY, NDSS,
+ 
+
+% READ TOCS from: ESORICS, INFOHIDING, IEEE S&P, USENIX SECURITY, NDSS,
+%     PET 2002 and earlier.
+
+
+%  Y. Zhu, Xinwen Fu, R. Bettati, Wei Zhao, ``Anonymity Analysis of Mix 
+% Networks against Flow-Correlation Attacks,''  Proceedings of IEEE Globecom
+%% Computer and Network Security, St. Louis, MO, November 2005. ( pdf )
+% http://faculty.cs.tamu.edu/bettati/Papers/Globecom05/globecom05.pdf
+
+
+@inproceedings{pet05-bissias,
+  author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
+  title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
+  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
+  month = {May},
+  year = {2005},
+  www_section = fp,
+  www_pdf_url = "http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf";
+}
+
+@inproceedings{pet05-zhu,
+  author = {Ye Zhu and Ricardo Bettati},
+  title = {Unmixing Mix Traffic},
+
+  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
+  month = {May},
+  year = {2005},
+  www_section = traffic,
+  www_pdf_url = {http://petworkshop.org/2005/workshop/talks/zhubettatiPET2005.pdf}
+}
+
+@InProceedings{danezis:pet2004,
+   author = {George Danezis},
+   title = {The Traffic Analysis of Continuous-Time Mixes},
+   booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
+   year = {2004},
+   month = {May},
+   series = {LNCS},
+  volume =       {3424},
+   www_section = ct,
+   www_important = {1},
+   www_pdf_url = "http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf";,
+}
+
+@InProceedings{flow-correlation04,
+   author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
+   title = {On Flow Correlation Attacks and Countermeasures in Mix Networks},
+   booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
+   year = {2004},
+   month = {May},
+   series = {LNCS},
+  volume =       {3424},
+   www_section = ct,
+   www_pdf_url = "http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf";,
+}
+
+% NOT IN ANONBIB
+@TechReportInProceedings{correlation-attacks03,
+   author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
+   title = {Correlation Attacks in a mix network},
+   year = {2003},
+   institution = {Texas A&M University Computer Science Department}
+   type = {Technical Report}
+   volume =       {TR2003-8-9},
+   www_section = ct,
+   notes = {Doesn't seem to exist on the TAMU CS department's TR page.}
+}
+
+@InProceedings{TH04,
+  author =       {Gergely T\'oth and Zolt\'an Horn\'ak},
+  title =        {Measuring Anonymity in a Non-adaptive, Real-time System},
+   booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
+  year =         {2004},
+  series =       {Springer-Verlag, LNCS},
+  volume =       {3424},
+  pages =        {226--241}
+  www_section = unc,
+  www_pdf_url = {http://home.mit.bme.hu/~tgm/phd/publikaciok/2004/pet2004/pet2004-lncs-tg.pdf}
+}
+
+% From references sections of pet2003-pet2005
+
+
+@InProceedings{SS03,
+  author = {Andrei Serjantov and Peter Sewell},
+  title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
+  booktitle = {Proceedings of ESORICS 2003},
+  year = {2003},
+  month = {October},
+  www_section = traffic,
+  www_ps_url = "http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps";,
+  www_remarks =
+{An investigation of packet counting attacks (which work best on lightly
+ loaded networks) and connection-start timing attacks.}
+}
+
+@InProceedings{onion-routing:pet2000,
+  author =       {Paul Syverson and Gene Tsudik and Michael Reed
+                  and Carl Landwehr},
+  title =        {{Towards an Analysis of Onion Routing Security}},
+  booktitle =    {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+                  on Design Issues in Anonymity and Unobservability},
+  year =         2000,
+  month =        {July},
+  pages =        {96--114},
+  editor =       {H. Federrath},
+  publisher =    {Springer-Verlag, LNCS 2009},
+  www_section = comm,
+  www_ps_gz_url = "http://www.onion-router.net/Publications/WDIAU-2000.ps.gz";,
+  www_important = {1},
+}
+
+
+@InProceedings{mitkuro,
+   author =      {M. Mitomo and K. Kurosawa},
+   title =       {{Attack for Flash MIX}},
+   booktitle =   {Proceedings of {ASIACRYPT} 2000},
+   year =        {2000},
+   publisher =   {Springer-Verlag, LNCS 1976},
+   www_section = proofs,
+   www_html_url = "http://citeseer.nj.nec.com/450148.html";,
+}
+
+@InProceedings{wright02,
+   author =      {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
+   title =       {An Analysis of the Degradation of Anonymous Protocols},
+   booktitle =   {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02},
+   year =        {2002},
+   month = February,
+   publisher =   {IEEE},
+   www_section = traffic,
+   www_pdf_url = "http://www.cs.umass.edu/~mwright/papers/wright-degrade.pdf";,
+}
+
+
+@InProceedings{TrafHTTP,
+  author =       {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu},
+  title =        {Statistical Identification of Encrypted Web Browsing Traffic},
+  booktitle = {Proceedings of the 2002 IEEE Symposium on Security and Privacy},
+  pages =        {19},
+  year =         {2002},
+  address =      {Berkeley, California},
+  month =        {May},
+  www_section = fp,
+  www_pdf_url = {ftp://ftp.research.microsoft.com/pub/tr/tr-2002-23.pdf}
+}
+
+
+@InProceedings{fu-active,
+  author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
+  title = {Active Traffic Analysis Attacks and Countermeasures},
+  booktitle = {Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing},
+  year = {2003},
+  pages = {31--39},
+  www_pdf_url = {http://ieeexplore.ieee.org/iel5/8807/27858/01243024.pdf}
+}
+
+@InProceedings{fu-active,
+  author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao},
+  title = {Analytical and Empirical Analysis of Coutermeasures to Traffic Analysis Attacks},
+  Booktitle = {Proceedings of the 2003 International Conference on Parallel Processing}
+  year = {2003},
+  pages={483--492},
+  www_pdf_url = {http://faculty.cs.tamu.edu/bettati/Papers/icpp2003/icpp2003.pdf}
+}
+
+% NOT ON ANONBIB.
+@Misc{dai-freedom,
+  author = {Wei Dai},
+  title = {Two attacks against freedom},
+  howpublished = "Post to Cypherpunks mailing list",
+  year = 2000,
+  www_html_url = "http://eskimo.com/~eidai/freedom-attacks.txt";,
+  www_section = traffic
+}
+
+@InProceedings{rackoff93cryptographic,
+   author =      {Charles Rackoff and Daniel R. Simon},
+   title =       {Cryptographic Defense Against Traffic Analysis},
+   booktitle =   {Proceedings of {ACM} Symposium on Theory of Computing},
+   pages =       {672--681},
+   year =        {1993},
+   www_section = traffic,
+%   www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm";,
+%   www_important = {1},
+   www_ps_url = {http://research.microsoft.com/crypto/papers/ta.ps},
+}
+
+% not in anonbib
+@InProceedings{TH06a,
+  author =       {Gergely T\'oth and Zolt\'an Horn\'ak},
+  title =        {The Chances of Successful Attacks Against Continuous-time
++Mixes},
+  booktitle =    {Proceedings of the 11th Nordic Workshop on Secure IT Systems},
+  year =         {2006},
+  address =      {Link\"oping, Sweden}
+}
+
+% Read
+
+@InProceedings{langos02,
+  author =      {Oliver Berthold and Heinrich Langos},
+  title =       {Dummy Traffic Against Long Term Intersection Attacks},
+  booktitle =    {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
+  year =         {2002},
+  month = {April},
+  editor =       {Roger Dingledine and Paul Syverson},
+  publisher =    {Springer-Verlag, LNCS 2482},
+  www_section =  traffic,
+  www_pdf_url = "http://www.inf.fu-berlin.de/~berthold/publ/BeLa_02.pdf";,
+  notes = { Not about low-latency traffic analsis. }
+}
+
+@InProceedings{back01,
+  author =       {Adam Back and Ulf M\"oller and Anton Stiglic},
+  title =        {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
+  booktitle =    {Proceedings of Information Hiding Workshop (IH 2001)},
+  pages =        {245--257},
+  year =         2001,
+  month = "April",
+  editor =       {Ira S. Moskowitz},
+  publisher =    {Springer-Verlag, LNCS 2137},
+  www_section =  traffic,
+  www_important = 1,
+  www_pdf_url =  "http://www.cypherspace.org/adam/pubs/traffic.pdf";,
+  notes = { Vaguely describes packet counting in 6.1; doesn't seem to
+                  understand that it works end-to-end.}
+}
+
+
+@InProceedings{raymond00,
+  author =       {Jean-Fran\c{c}ois Raymond},
+  title =        {{Traffic Analysis: Protocols, Attacks, Design Issues,
+                  and Open Problems}}, 
+  booktitle =   {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+                  on Design Issues in Anonymity and Unobservability},
+  year =         2000,
+  month =        {July},
+  pages =        {10-29},
+  editor =       {H. Federrath},
+  publisher =    {Springer-Verlag, LNCS 2009},
+  www_section = traffic,
+  www_important = {1},
+  www_ps_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.ps},
+  www_pdf_url = {http://www.geocities.com/j_f_raymond/mesarticles/berkeley_ws_lncs.pdf},
+  notes = {Not terribly useful; describtes timing and volume attacks
+                  only slightly. }
+}
+
+
+@InProceedings{stepping-stones,
+  author = {Xinyuan Wang and Douglas S. Reeves and S. Felix Wu},
+  title = {Inter-Packet Delay Based Coorelation for Tracing Encrypted Connections through Stepping Stones},
+  Booktitle = {Proceedings of ESORICS 2002},
+  Year = {2002},
+  month = {October},
+  pages = {244--263},
+  www_section = traffic,
+  www_pdf_url = {http://arqos.csc.ncsu.edu/papers/2002-08-esorics02-ipd-correlation.pdf}
+  notes = {Very nicely written formulation of end-to-end timing
+                  correlation, with experiments and methods. Focused
+                  on tracing ersatz anonymizers constructed by an
+                  attacker. }
+
+}
+
+@InProceedings{disad-free-routes,
+   author =      {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
+   title =       {The disadvantages of free {MIX} routes and how to overcome
+                  them}, 
+   booktitle =   {Proceedings of Designing Privacy Enhancing Technologies: Workshop
+                  on Design Issues in Anonymity and Unobservability},
+   pages =       {30--45},
+   month = {July},
+   year =        2000,
+   editor =       {H. Federrath},
+   publisher =    {Springer-Verlag, LNCS 2009},
+   www_section = traffic,
+   www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf";
+%   www_important = {1},
+   notes = {Nothing about how to do e2e correlation or fingerprinting.}
+}
+
+
+@InProceedings{timing-fc2004,
+  author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright},
+  title = {Timing Attacks in Low-Latency Mix-Based Systems (Extended Abstract)},
+  booktitle = {Proceedings of Financial Cryptography (FC '04)},
+  year = {2004},
+  month = February,
+  editor = {Ari Juels},
+  publisher = {Springer-Verlag, LNCS 3110},
+  www_section =  traffic,
+  www_pdf_url =  "http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf";,
+  notes = {Uses cross-correlation of
+                  n-packets-received-in-interval. Assumes IP-like
+                  traffic. Analyzes simulated results for various IP
+                  trace models, along with "defensive dropping." }
+}
+
+
+@InProceedings{hintz02,
+  author =      {Andrew Hintz},
+  title =       {Fingerprinting Websites Using Traffic Analysis},
+  booktitle =    {Proceedings of Privacy Enhancing Technologies workshop (PET 2002)},
+  year =         {2002},
+  month = {April},
+  editor =       {Roger Dingledine and Paul Syverson},
+  publisher =    {Springer-Verlag, LNCS 2482},
+  www_section =  traffic,
+  www_html_url = "http://guh.nu/projects/ta/safeweb/safeweb.html";,
+  www_pdf_url = "http://guh.nu/projects/ta/safeweb/safeweb.pdf";,
+  www_ps_url = "http://guh.nu/projects/ta/safeweb/safeweb.ps";,
+  notes = {Introduces fingerprinting.  Doesn't do much statistics.}
+}
+
+
+
+@InProceedings{limits-open,
+  author =       {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
+  title =        {Limits of Anonymity in Open Environments},
+  booktitle =    {Proceedings of Information Hiding Workshop (IH 2002)},
+  year =         {2002},
+  month = "October",
+  editor =       {Fabien Petitcolas},
+  publisher =    {Springer-Verlag, LNCS 2578},
+  www_section = traffic,
+  notes = {Examines the success of the (original, non-statistical) disclosure attack.}
+}

Modified: doc/trunk/pingers/echolot.pdf
===================================================================
(Binary files differ)

***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxx with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/