发表状态 | 已发表Published |
题名 | Novel packet size-based covert channel attacks against anonymizer |
作者 | |
发表日期 | 2013 |
发表期刊 | IEEE Transactions on Computers
![]() |
ISSN/eISSN | 0018-9340 ; 1557-9956 |
卷号 | 62期号:12页码:2411-2426 |
摘要 | In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial anonymous communication system. We discovered the architecture of Anonymizer and found that the size of web packets in the Anonymizer network can be very dynamic at the client. Motivated by this finding, we investigated a class of novel packet size-based covert channel attacks against Anonymizer. The attacker between a website and the Anonymizer server can manipulate the web packet size and embed secret signal symbols into the target traffic. An accomplice at the user side can sniff the traffic and recognize the secret signal. In this way, the anonymity provided by Anonymizer is compromised. We developed intelligent and robust algorithms to cope with the packet size distortion incurred by Anonymizer and Internet. We developed techniques to make the attack harder to detect: 1) We pick up right packets of web objects to manipulate to preserve the regularity of the TCP packet size dynamics, which can be measured by the Hurst parameter; 2) We adopt the Monte Carlo sampling technique to preserve the distribution of the web packet size despite manipulation. We have implemented the attack over Anonymizer and conducted extensive analytical and experimental evaluations. It is observed that the attack is highly efficient and requires only tens of packets to compromise the anonymous web surfing via Anonymizer. The experimental results are consistent with our theoretical analysis. © 2013 IEEE. |
关键词 | Anonymizer TCP dynamics Watermark |
DOI | 10.1109/TC.2012.169 |
URL | 查看来源 |
收录类别 | SCIE |
语种 | 英语English |
WOS研究方向 | Computer Science ; Engineering |
WOS类目 | Computer Science, Hardware & Architecture ; Engineering, Electrical & Electronic |
WOS记录号 | WOS:000327409300006 |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/1893 |
专题 | 个人在本单位外知识产出 |
作者单位 | 1.School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2.Department of Computer Science, University of Massachusetts Lowell, Lowell, MA 01854, United States 3.Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong, Tat Chee Avenue, Hong Kong, China 4.Department of Computer and Information Sciences, Towson University, Towson, MD 21252, United States 5.Department of Computer Science and Engineering, Ohio State University, Columbus, OH 43210, United States |
推荐引用方式 GB/T 7714 | Ling, Zhen,Fu, Xinwen,Jia, Weijiaet al. Novel packet size-based covert channel attacks against anonymizer[J]. IEEE Transactions on Computers, 2013, 62(12): 2411-2426. |
APA | Ling, Zhen, Fu, Xinwen, Jia, Weijia, Yu, Wei, Xuan, Dong, & Luo, Junzhou. (2013). Novel packet size-based covert channel attacks against anonymizer. IEEE Transactions on Computers, 62(12), 2411-2426. |
MLA | Ling, Zhen,et al."Novel packet size-based covert channel attacks against anonymizer". IEEE Transactions on Computers 62.12(2013): 2411-2426. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论