TU Darmstadt / ULB / TUbiblio

Internal Attacks in Anonymous Publish-Subscribe P2P Overlays

Jörg, Daubert ; Fischer, Mathias ; Mühlhäuser, Max ; Grube, Tim (2015)
Internal Attacks in Anonymous Publish-Subscribe P2P Overlays.
International Conference on Networked Systems (NetSys).
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especially when considering the threat of political repression and censorship. P2P-based publish-subscribe is a well suited paradigm for OSN scenarios as users can publish and follow topics of interest. How- ever, anonymity in P2P-based publish-subscribe (pub-sub) has been hardly analyzed so far. Research on add-on anonymization systems such as Tor mostly focuses on large scale traffic analysis rather than malicious insiders. Therefore, we analyze colluding insider attackers in more detail that operate on the basis of timing information. For that, we model a generic anonymous pub-sub system, present an attacker model, and discuss timing attacks. We analyze these attacks by a realistic simulation model and discuss potential countermeasures. Our findings indicate that even few malicious insiders are capable to disclose a large number of participants, while an attacker using large amounts of colluding nodes achieves only minor additional improvements.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2015
Autor(en): Jörg, Daubert ; Fischer, Mathias ; Mühlhäuser, Max ; Grube, Tim
Art des Eintrags: Bibliographie
Titel: Internal Attacks in Anonymous Publish-Subscribe P2P Overlays
Sprache: Englisch
Publikationsjahr: März 2015
Verlag: IEEE Computer Society
Veranstaltungstitel: International Conference on Networked Systems (NetSys)
Kurzbeschreibung (Abstract):

Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especially when considering the threat of political repression and censorship. P2P-based publish-subscribe is a well suited paradigm for OSN scenarios as users can publish and follow topics of interest. How- ever, anonymity in P2P-based publish-subscribe (pub-sub) has been hardly analyzed so far. Research on add-on anonymization systems such as Tor mostly focuses on large scale traffic analysis rather than malicious insiders. Therefore, we analyze colluding insider attackers in more detail that operate on the basis of timing information. For that, we model a generic anonymous pub-sub system, present an attacker model, and discuss timing attacks. We analyze these attacks by a realistic simulation model and discuss potential countermeasures. Our findings indicate that even few malicious insiders are capable to disclose a large number of participants, while an attacker using large amounts of colluding nodes achieves only minor additional improvements.

Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Telekooperation
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Hinterlegungsdatum: 26 Mär 2015 08:30
Letzte Änderung: 14 Jun 2021 06:14
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen