TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

02/23/2018
by   Chen Chen, et al.
0

Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis. On the other hand, high-latency anonymity systems offer strong security guarantees at the cost of computational overhead and long delays, which are excessive for interactive applications. We propose TARANET, an anonymity system that implements protection against traffic analysis at the network layer, and limits the incurred latency and overhead. In TARANET's setup phase, traffic analysis is thwarted by mixing. In the data transmission phase, end hosts and ASes coordinate to shape traffic into constant-rate transmission using packet splitting. Our prototype implementation shows that TARANET can forward anonymous traffic at over 50 Gbps using commodity hardware.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/29/2019

Expanding across time to deliver bandwidth efficiency and low latency

Datacenters need networks that support both low-latency and high-bandwid...
research
10/27/2017

PriFi: A Low-Latency Local-Area Anonymous Communication Network

Popular anonymity protocols such as Tor provide low communication latenc...
research
05/03/2023

Scheduling Network Function Chains Under Sub-Millisecond Latency SLOs

Network Function Virtualization (NFV) seeks to replace hardware middlebo...
research
10/01/2019

Stealthy Opaque Predicates in Hardware – Obfuscating Constant Expressions at Negligible Overhead

Opaque predicates are a well-established fundamental building block for ...
research
06/19/2019

Reduced I/O Latency with Futures

Task parallelism research has traditionally focused on optimizing comput...
research
01/19/2023

OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads

Traffic analysis attacks remain a significant problem for online securit...
research
10/23/2022

To Signal or Not to Signal? Layering Traffic Analysis Resistance on Secure Instant Messaging

Traffic analysis for instant messaging (IM) applications continues to po...

Please sign up or login with your details

Forgot password? Click here to reset