Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Privacy enhancement in anonymous network channels using multimodality injection

Published: 10 November 2015 Publication History

Abstract

The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto-types. The random walk mechanism is responsible for generating network patterns, and the cryptotype performs the micro-encryption tasks using series of quantum-resistant cryptography methods through the anonymous channel. The result shows that using this technique, we can prevent network analysis attacks by means of the generation of a different pattern in each execution for the same set of data. Namely, the experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against data analysis attacks because the intruders could consider the generated patterns as the typical patterns. Copyright © 2015 John Wiley & Sons, Ltd.

References

[1]
Chaabane A, Manils P, Kaafar MA. Digging into anonymous traffic: a deep analysis of the Tor anonymizing network. In proceeding of 4th International Conference on Network and System Security NSS, 2010; pp.167-174.
[2]
Tavakoly A, Atani RE. Improving Tor security against timing and traffic analysis attacks with fair randomization. The ISC International Journal of Information Security 2014; Volume 6 Issue 1: pp.67-76.
[3]
Díaz C, Seys S, Claessens J. Towards measuring anonymity. Proceedings of the 2nd international conference on Privacy enhancing technologies, 2002; pp.54-68.
[4]
Nia MA, Ghorbani A, Atani RE. A novel anonymous cloud architecture design; providing secure online services and electronic payments. The first international conference on electronic commerce and economy, arXiv:1404.2261, Tehran, 2013.
[5]
Rebollo-Monedero D, Forné J, Pallarès E, et al.On collaborative anonymous communications in lossy networks. Journal of Security and Communication Network, John Wiley Press December 2014; Volume 7 Issue 12: pp.2761-2777.
[6]
Callado A, Kamienski C, Szabó G, Péter-Gerö B, Kelner J, Fernandes S. A survey on internet traffic identification. IEEE communications surveys & tutorials 2009; Volume 11 Issue 3: 3rd quarter, pp.1-16.
[7]
Nia MA, Karbasi AH, Atani RE. Stop tracking me: an anti-detection type solution for anonymous data. In proceeding of the 4th international conference on Computer and Knowledge Engineering, Mashhad, Iran, October 2014.
[8]
Dingledine R, Mathewson N, Syverson N. Tor: the second-generation onion router. Proceedings of the 13th USENIX Security Symposium, 2004.
[9]
Coull SE, Wright CV, Monrose F, Collinsy MP, Reiter MK. Playing devil's advocate: inferring sensitive information from anonymized network traces. Proceedings of the Network and Distributed System Security Symposium, 2007.
[10]
Wright CV, Monrose F, Masson GM. On inferring application protocol behaviors in encrypted network traffic. The Journal of Machine Learning Research archive 2006; Volume 7: pp.2745-2769.
[11]
Coull SE, Wright CV, Keromytisz, Monrose F, Reiter MK. Taming the devil: techniques for evaluating anonymized network data. Proceeding of Network and Distributed System Security Symposium, San Diego, California, 2008.
[12]
Coull SE, Collins MP, Wright CV, Monrose F, Reiter MK. On web browsing privacy in anonymized NetFlows. SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Article No. 23, 2007.
[13]
Rijsbergen NV, Valk K. Tor vs the NSA. Technical repot Radboud University Nijmegen, supervised by Anna Krasnova, 2014.
[14]
Grinstead CM. Introduction to Probability. American Mathematical Society; 2 Revised edition, academic book, chapter 12, July 1997.
[15]
Chang JT, Peres Y. Ladder heights, gaussian random walks and the riemann zeta function. Journal The Annals of Probability 1997; Volume 25 Issue 2: pp.787-802.
[16]
Nia MA, Atani RE. A novel datatype architecture support for programming languages. International journal of programming languages and applications January 2014; Volume 4 Issue 1: pp.1-18.
[17]
Nia MA, Atani RE, Haghi AK. Ubiquitous IoT structure via homogeneous data type modelling. In proceeding of the 7th International Symposium on Telecommunications IST 2014, September 2014
[18]
Cardelli L. Type systems. ACM Journal of Computing Surveys CSUR 1996; Volume 28 Issue 1: pp.263-264.
[19]
Duggan D. Cryptographic types. CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations, 2002.
[20]
Lov¿asz L. Random walks on graphs: a survey. Journal of Mathematical Studies, Bolyai Society 1993; Volume 2: pp.1-46.
[21]
Pierce BC. Advanced Topics in Types and Programming Languages, The MIT Press, Cambridge, Massachusetts, chapter 4 and 5, 2005; pp.141-220.
[22]
Morrisett G, Craryy K, Glew N, Grossman D, Samuels R, Smith F, Walker D, Weirich S, Zdancewic S. TALx86: a realistic typed assembly language. Proceeding of ACM Workshop on Compiler Support for System Software 1999: pp.25-35.
[23]
Tate R, Chen J, Hawblitzel C. "Inferable object-oriented typed assembly language ", In Proceedings of the 2010 ACM SIGPLAN conference on Programming language design, 2010; pp.424-435.
[24]
Duggan D. Type-based cryptographic operations. Journal of Computer Security - Special issue on CSFW15 archive 2004; Volume 12 Issue 3: pp.485-550.
[25]
Doyle PG, JLSnell. "Random Walks and Electric Networks ", The Mathematical Association of America, chapter1, academic book, 1984 revised book 2006.
[26]
Lawler GF, Limic V. "Random walk: a modern introduction ", Cambridge University Press, NY, Cambridge Studies in Advanced Mathematics, Chapters 5 - 6, July 2010.
[27]
Kozdron M, "An introduction to random walks from polya to self-avoidance "Technical report, Duke University, December 1998.
[28]
Slade G, Blath J, Imkeller P, Roelly S, "The Self-Avoiding Walk: A Brief Survey " To appear in Surveys in Stochastic Processes, Proceedings of the Thirty-third SPA Conference in Berlin, 2009.
[29]
Karal T, Slade G. "Self-avoiding walk in five or more dimensions I. The critical behaviour ", Journal of Communications in Mathematical Physics, Springer-Verlag, 1992; Volume 147: pp.101-136.
[30]
Bauerschmidt R, Duminil-Copin H, Goodman J, Slade G. Lectures on self-avoiding walks. Clay Mathematics Proceedings 2012; Volume 15.
[31]
NMadras, GSlade. "The self-avoiding walk ", Academic book published in the series Probability and Its Applications, Chapter7, edition 2013.
[32]
Fouss F, Pirotte A, Renders JM, Saerens M. Random-walk computation of similarities between nodes of a graph, with application to collaborative recommendation. IEEE Transactions on Knowledge and Data Engineering 2006; Volume 19 Issue 3: pp.355-369.
[33]
Gkantsidis C, Mihail M, Saberi A. "Random walks in peer-to-peer networks ", Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies INFOCOM, March 2004.
[34]
Akyildiz IF, Lin YB, Lai WR, Chen RJ. "A new random walk model for PCS networks ", IEEE Journal On Selected Areas In Communications, 2000; Volume 18 Issue 7.
[35]
Noh JD, Rieger H. "Random Walks on Complex Networks ", Statistical Mechanics, Cornell University Library, Arxiv online, 2003.
[36]
Pascoal C, Rosario de Oliveira M, Valadas R, Filzmoser P, Salvador P, Pacheco A. "Robust feature selection and robust PCA for internet traffic anomaly detection ", in proceeding of IEEE INFOCOM, 2012; pp.1755-1763.
[37]
Dobrescu R, Dobrescu M, Hossu D, Taralunga S. "Using internet traffic self-similarity for detection of network anomalies ", Proceeding of 11th International Conference on Optimization of Electrical and Electronic Equipment, 2008; pp.81-86.
[38]
Lin WWK, Wu RSL, Wong AKY, Dillon TS. "A novel internet real-time traffic pattern detection technique for better pervasive computing ", Proceeding of the First International Symposium on Pervasive Computing and Applications, 2006; pp.719-724.
[39]
Lu CN, Huang CY, Lin YD, Lai YC. Session level flow classification by packet size distribution and session grouping. Journal of Computer Networks 2012; Volume 56: pp.260-272.
[40]
Moore AW, Zuevy D. "Internet traffic classification using bayesian analysis techniques ", Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2005: pp.50-60.
[41]
Murdoch SJ, Danezis G. "Low-cost traffic analysis of Tor ", Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society Washington, DC, USA, 2005; pp.183-195.
[42]
Eckersley P, Atallah MJ, Hopper NJ. "How unique is your web browser? ", Proceedings of the 10th international conference on Privacy enhancing technologies, 2010; pp.1-18.
[43]
Acar G, Juarez M, Nikiforakis N, Diaz C, Gürses S, Piessens F, Preneel B ."FPDetective: dusting the web for fingerprinters ", In Proceedings of the ACM SIGSAC Conference on Computer & Communications Security,New York, USA, 2013; pp.1129-1140.
[44]
Yen TF, Huang X, Monrose F, Reiter MK. "Browser fingerprinting from coarse traffic summaries: techniques and implications ", In proceeding of DIMVA 2009, LNCS 5587, 2009; pp.157-175.
[45]
Fusco F Luca D. "High speed network traffic analysis with commodity multi-core systems ", In proceeding of IMC'10 conference, Melbourne, Australia, 2010; pp.218-224.
[46]
Wright CV, Coull SE, Monrose F. "Traffic morphing: an efficient defense against statistical traffic analysis ", In Proceedings of the 16th Network and Distributed Security Symposium, 2009.
[47]
Deng J, Han R, Mishra S. "Decorrelatingwireless sensor network traffic to inhibit traffic analysis attacks ", Elsevier Pervasive and Mobile Computing Journal, Special Issue on Security in Wireless Mobile Computing Systems, 2006; Volume 2 Issue 2: pp.159-186.
[48]
Castro ERS, Alencar MS, Fonseca IE. "Probability density functions of the packet length for computer networks with bimodal traffic ", International Journal of Computer Networks & Communications IJCNC, 2013; Volume 5 Issue 3.
[49]
Necula GC, Lee P. "Safe, untrusted agents using proof-carrying code ", in proceeding of Mobile Agents and Security, Springer-Verlag: London, UK, 1998; pp.61-91.
[50]
Perlner RA, Cooper DA. "Quantum resistant public key cryptography: a survey ", In Proceedings of the 8th Symposium on Identity and Trust on the Internet, 2009; pp.85-93.

Cited By

View all
  • (2016)On detecting unidentified network traffic using pattern-based random walkSecurity and Communication Networks10.1002/sec.15579:16(3509-3526)Online publication date: 10-Nov-2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Security and Communication Networks
Security and Communication Networks  Volume 8, Issue 16
November 2015
351 pages
ISSN:1939-0114
EISSN:1939-0122
Issue’s Table of Contents

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 10 November 2015

Author Tags

  1. anonymous network channels
  2. multimodality injection
  3. network data analysis
  4. self-avoiding random walk
  5. weighted crypto-type

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2016)On detecting unidentified network traffic using pattern-based random walkSecurity and Communication Networks10.1002/sec.15579:16(3509-3526)Online publication date: 10-Nov-2016

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media