[1]傅翀,钱伟中,赵明渊,等.匿名通信系统时间攻击的时延规范化防御方法[J].东南大学学报(自然科学版),2009,39(4):738-741.[doi:10.3969/j.issn.1001-0505.2009.04.017]
 Fu Chong,Qian Weizhong,Zhao Mingyuan,et al.Delay normalization method of defending against timing-based attacks on anonymous communication systems[J].Journal of Southeast University (Natural Science Edition),2009,39(4):738-741.[doi:10.3969/j.issn.1001-0505.2009.04.017]
点击复制

匿名通信系统时间攻击的时延规范化防御方法()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
39
期数:
2009年第4期
页码:
738-741
栏目:
计算机科学与工程
出版日期:
2009-07-20

文章信息/Info

Title:
Delay normalization method of defending against timing-based attacks on anonymous communication systems
作者:
傅翀 钱伟中 赵明渊 秦志光
电子科技大学计算机科学与工程学院, 成都 610054
Author(s):
Fu Chong Qian Weizhong Zhao Mingyuan Qin Zhiguang
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
关键词:
匿名通信系统 时间攻击 时延规范化
Keywords:
anonymous communication system timing-based attack delay normalization
分类号:
TP393.08
DOI:
10.3969/j.issn.1001-0505.2009.04.017
摘要:
为了防御针对匿名通信系统的时间攻击,提出一种基于数据包时延规范化的防御方法.该方法将数据流中所有时延间隔调整至一个固定值,防止攻击者嵌入标记信息,从而达到防御攻击的目的.该固定值利用经验指定法或者移动平均法确定.如果包间时延间隔小于该值,延长此包间时延间隔; 如果包间时延间隔大于该值,则插入1个或者多个干扰包.这样可使得所有时延间隔相同且等于该固定值.对时间水印攻击的防御实验结果表明,该方法的防御效果不受攻击者选取的起始时间和用于嵌入水印的时间间隔影响.真实网络环境中的实验结果显示,时间水印攻击的错误识别率均值达到43.51%,证明了该方法的有效性.
Abstract:
To defend against the timing-based attacks on anonymous communication systems, a delay normalization method based on packets is proposed. This method normalizes all inter-packet intervals to a fixed value, and therefore prevents timing marks in the data stream by adjusting these intervals. The value can be defined through experience or a moving average method. When the inter-packet intervals in the data stream are less than the value, they are prolonged; when the inter-packet intervals are greater than the value, one or more chaff packets are inserted. Thus, all inter-packet intervals are the same and equal to the fixed value. The experimental results of defending against timing watermark attacks show that both the start time chosen by attackers and the intervals used to embed watermark can not influence the defensive effect of the method. The experimental results in the real network environment show that the average error rate of the timing watermark recognition reaches 43.51%, which proves that the proposed method is effective.

参考文献/References:

[1] Pfitzmann A,Waidner M.Networks without user observability—design options [J]. Computers and Security,1987,6(2):158-166.
[2] Yoda K,Etoh H.Finding a connection chain for tracing intruders [C] //The 6th European Symposium on Research in Computer Security.Toulouse,France,2000:191-205.
[3] Zhang Y,Paxson V.Detecting stepping stones [C] //The 9th USENIX Security Symposium.Denver,USA,2000:13-26.
[4] Dingledine D,Mathewson N,Syverson P F.Tor:the second generation onion router [C] //The 13th USENIX Security Symposium.San Diego,USA,2004:303-320.
[5] Shimshock E,Staats M,Hopper N.Breaking and provably fixing minx [C] //The 8th International Symposium on Privacy Enhancing Technologies.Leuven,Belgium,2008:99-114.
[6] Venkitasubramaniam P,Tong L.Anonymous networking with minimum latency in multihop networks [C] //The 2008 IEEE Symposium on Security and Privacy.Oakland,USA,2008:18-32.
[7] Wright C V,Ballard L,Coull S E,et al.Spot me if you can:uncovering spoken phrases in encrypted VoIP conversations [C] //The 2008 IEEE Symposium on Security and Privacy.Oakland,USA,2008:35-49.
[8] Saponas T S,Lester J,Hartung C,et al.Devices that tell on you:privacy trends in consumer ubiquitous computing [C] //The 16th USENIX Security Symposium.Boston,USA,2007:55-70.
[9] Wang X,Chen S,Jajodia S.Network flow watermarking attack on low-latency anonymous communication systems [C] //The 2007 IEEE Symposium on Security and Privacy.Washington DC,USA,2007:116-130.
[10] Wiangsripanawan R,Susilo W,Safavi-Naini R.Design principles for low latency anonymous network systems secure against timing attacks [C] //The 5th Australasian Symposium on ACSW Frontiers.Ballarat,Australia,2007:183-191.

相似文献/References:

[1]何高峰,罗军舟.G-Hordes:一种安全的匿名通信系统[J].东南大学学报(自然科学版),2009,39(2):220.[doi:10.3969/j.issn.1001-0505.2009.02.007]
 He Gaofeng,Luo Junzhou.G-Hordes: a safe anonymous communication system[J].Journal of Southeast University (Natural Science Edition),2009,39(4):220.[doi:10.3969/j.issn.1001-0505.2009.02.007]

备注/Memo

备注/Memo:
作者简介: 傅翀(1976—), 男, 博士生, 讲师, fuc@uestc.edu.cn.
基金项目: 国家242信息安全计划资助项目(2006C27).
引文格式: 傅翀,钱伟中,赵明渊,等.匿名通信系统时间攻击的时延规范化防御方法[J].东南大学学报:自然科学版,2009,39(4):738-741. [doi:10.3969/j.issn.1001-0505.2009.04.017]
更新日期/Last Update: 2009-07-20