Journal
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 18, Issue 5, Pages 2271-2284Publisher
IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2019.2947666
Keywords
Correlation; Internet; Overlay networks; Relays; Wavelet analysis; Encryption; Anonymity; overlay networks; flow correlation; wavelets; multi-resolution analysis; distributed traffic interception
Ask authors/readers for more resources
This study introduces a new strategy to defeat the anonymity of traffic flows within anonymizing networks, using distributed flow-capture, characterization and correlation attacks driven by wavelet-based multi-resolution analysis. This strategy is effective and promising, and can be easily deployed on real-life network equipment.
Government agencies rely more and more heavily on the availability of flexible and intelligent solutions for the interception and analysis of Internet-based telecommunications. Unfortunately, the global lawful interception market has been recently put into a corner by the emerging sophisticated encryption, obfuscation and anonymization technologies provided by modern overlay communication infrastructures. To face this challenge, this work proposes a novel strategy for defeating the anonymity of traffic flows, collected within and at the exit of these anonymizing networks, relying on distributed flow-capture, characterization and correlation attacks driven by wavelet-based multi-resolution analysis. Such a strategy, starting from a properly formalized attack model, results in an effective and promising framework that can be easily deployed on real-life network equipment and can potentially scale by working according to different distribution/parallelization scenarios.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available