DOI: 10.1007/978-3-540-70630-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Metrics for Security and Performance in Low-Latency Anonymity Systems

Abstract: Abstract. In this paper we explore the tradeoffs between security and performance in anonymity networks such as Tor. Using probability of path compromise as a measure of security, we explore the behaviour of various path selection algorithms with a Tor path simulator. We demonstrate that assumptions about the relative expense of IP addresses and cheapness of bandwidth break down if attackers are allowed to purchase access to botnets, giving plentiful IP addresses, but each with relatively poor symmetric bandwi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
26
0

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 37 publications
(27 citation statements)
references
References 10 publications
1
26
0
Order By: Relevance
“…We find two approaches to alleviate this problem: using local estimations to improve performance [4,5,152], or providing means for users to make better decisions about routing individually [144]. The latter is known to be prone to attacks [78,110].…”
Section: Cumbersome Managementmentioning
confidence: 99%
“…We find two approaches to alleviate this problem: using local estimations to improve performance [4,5,152], or providing means for users to make better decisions about routing individually [144]. The latter is known to be prone to attacks [78,110].…”
Section: Cumbersome Managementmentioning
confidence: 99%
“…It is therefore advantageous to directly measure the probability that the user's security will be compromised, under the assumptions of the actual attackers' capabilities, rather than using proxies for this probability such as the various types of entropy. This is the approach used by Murdoch and Watson [5] to analyse the security of Tor directly, against an adversary who wishes to insert malicious nodes into the network so as to de-anonymize users. The goal of this analysis was to discover which of proposed schemes, for selecting Tor nodes in a circuit, is more secure.…”
Section: Low-latency Anonymous Communication Systemsmentioning
confidence: 99%
“…Snader and Borisov proposed in [30] the use of the Gini coefficient, as a way to measure inequalities in the circuit selection process of Tor. Murdoch and Watson propose in [31] to asses the bandwidth available to the adversary, and its effects to degrade the security of several path selection techniques.…”
Section: Related Workmentioning
confidence: 99%