Proceedings of the 16th ACM Conference on Computer and Communications Security 2009
DOI: 10.1145/1653662.1653709
|View full text |Cite
|
Sign up to set email alerts
|

Membership-concealing overlay networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(47 citation statements)
references
References 30 publications
0
47
0
Order By: Relevance
“…Some systems protect even the act of participation of nodes in the decentralized network from outside observers ("unobservability" [121] if the items of interest is the existence of users). In addition to more well-known work like Tor pluggable transports [122], the Membership Concealing Overlay Network (MCON) [157] leverages this to provide strong forms of covertness. All nodes in MCON only have links with trusted friends, and a complex overlay network is jointly created that allows all nodes to communicate indirectly with all nodes.…”
Section: How Does Decentralization Support Privacy?mentioning
confidence: 99%
“…Some systems protect even the act of participation of nodes in the decentralized network from outside observers ("unobservability" [121] if the items of interest is the existence of users). In addition to more well-known work like Tor pluggable transports [122], the Membership Concealing Overlay Network (MCON) [157] leverages this to provide strong forms of covertness. All nodes in MCON only have links with trusted friends, and a complex overlay network is jointly created that allows all nodes to communicate indirectly with all nodes.…”
Section: How Does Decentralization Support Privacy?mentioning
confidence: 99%
“…Their results indicate that existing attacks may expose clients to additional privacy risks and Tor exit routers should be treated as sharing a single IP prefix that is mentioned in the bridge design [19]. Vasserman et al [3] presented attacks against Tor bridges and discussed countermeasures using DHT-based overlay networks. Bauer et al [28] showed that an adversary who controlls only 6 malicious Tor routers can compromise over 46% of all clients' circuits in an experimental Tor network with 66 total routers.…”
Section: B Bridge Discovery Via Tor Middle Routersmentioning
confidence: 99%
“…However, our work and related work [3], [4] have shown two categories of bridge-discovery approaches: (i) enumeration of bridges via bulk email and Tor's https server, and (ii) use of malicious middle routers to discover bridges, which may pick up a malicious middle router as the second hop of a Tor routing path. Tor almost completely fails in China and we believe the Great Firewall of China may have blocked Tor bridges using these approaches as well as blocking all public Tor routers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Discussion To analyze our system, we obtain the growth rate of Tor relays from [50]. We estimate the client growth rate by analyzing how the number of client connections to a relay changes over a two month experiment [55]. We apply these rates and the estimated network size of 100,000 clients and 1,500 relays to find the total network size over time.…”
Section: Security Analysismentioning
confidence: 99%