Anonymous Routing & Anonymous Web Surfing: Caleb Cain & Savi Medlang

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Anonymous Routing &

Anonymous Web Surfing


Caleb Cain & Savi Medlang
Anonymous routing protocols - dht based protocols
● Design Goals
○ Develop more structured p2p systems
that can attain higher search
efficiency and scalability
● How it Works
○ Distributed storage of entities which
the names are known
○ Highly scalable
● Usage
● Drawbacks Source:https://medium.com/@michael.dufel_10220/distributed
○ Security -hash-tables-and-why-they-are-better-than-blockchain-for-exch
anging-health-records-d469534cc2a5
Anonymous routing protocols - dc nets
● Design Goals
○ Anonymous message publication
○ Non-Interactive anonymous message
transmission
● How it Works
○ Uses secrecy channels to provide a
secure, untraceable-sender system https://www.researchgate.net/publication/259347116_Seeking
_Anonymity_in_an_Internet_Panopticon/figures?lo=1
● Usage
● Drawbacks
○ Corruption or blockage the transmission
of messages
○ Poor Scalability
A Survey on Routing in Anonymous Communication Protocols
Fatemeh Shirazi, Milivoj Simeonovski Muhammad Rizwan Asghar, Michael Backes & Claudia Diaz

● Network Structure
○ Topology
○ Connection Type
○ Symmetry
● Routing Information
○ Update Frequency
● Communication Model
○ Routing Type
○ Scheduling
○ Node Selection
● Performance and Deployability Source:http://www.prometheusanalytics.net/products/promethe
○ Latency us-networks
A Survey on Routing in Anonymous Communication Protocols
1. Mixnet Based Protocols
2. Onion Routing Protocols
3. DHT-Based Protocols
4. DCNets
5. Misc
Vulnerabilities
- Survey of attacks on anonymity networks
- Intersection Attacks
- Packet Counting Attacks
- Fingerprinting Attacks

- Ignorance of Data
Vulnerabilities - Freenet
- Grand Forks, North Dakota
arrest
- BCI planted computers in
the network

- Darknet: connect only to


those trusted

Source:https://www.grandforksherald.com/news/4250527-former-pri
ncipal-charged-child-porn-had-many-roles-close-children
Vulnerabilities - Mix Networks
- Poor quality of service
- High Latencies
- Unreliability
- Don’t scale well
- Not a history of reliable protocols
- Compulsion Attacks
Vulnerabilities - Onion Router
- Focused on preventing traffic analysis
- Accepts network observation & traffic confirmation

- Freedom Hosting sites


- Browser Based Attacks
Vulnerabilities - I2P
- Floodfill takeover
- Eclipse Attack
- Denial of Service Attacks
- Brute Force

- Sybil Attacks

Source: https://coincentral.com/sybil-attack-blockchain/
Anonymous Web Browsers

Source: https://gulyas.info/files/publications/GulyasG_SPACE08.pdf
Anonymous Web Browsers

You might also like