DeepAI AI Chat
Log In Sign Up

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

02/23/2018
by   Chen Chen, et al.
EPFL
Corporation de l'ecole Polytechnique de Montreal
ETH Zurich
Carnegie Mellon University
UCL
0

Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis. On the other hand, high-latency anonymity systems offer strong security guarantees at the cost of computational overhead and long delays, which are excessive for interactive applications. We propose TARANET, an anonymity system that implements protection against traffic analysis at the network layer, and limits the incurred latency and overhead. In TARANET's setup phase, traffic analysis is thwarted by mixing. In the data transmission phase, end hosts and ASes coordinate to shape traffic into constant-rate transmission using packet splitting. Our prototype implementation shows that TARANET can forward anonymous traffic at over 50 Gbps using commodity hardware.

READ FULL TEXT

page 1

page 2

page 3

page 4

03/29/2019

Expanding across time to deliver bandwidth efficiency and low latency

Datacenters need networks that support both low-latency and high-bandwid...
10/27/2017

PriFi: A Low-Latency Local-Area Anonymous Communication Network

Popular anonymity protocols such as Tor provide low communication latenc...
06/09/2020

Parking Packet Payload with P4

Network Function (NF) deployments suffer from poor link goodput, because...
10/01/2019

Stealthy Opaque Predicates in Hardware – Obfuscating Constant Expressions at Negligible Overhead

Opaque predicates are a well-established fundamental building block for ...
10/23/2022

To Signal or Not to Signal? Layering Traffic Analysis Resistance on Secure Instant Messaging

Traffic analysis for instant messaging (IM) applications continues to po...
06/19/2019

Reduced I/O Latency with Futures

Task parallelism research has traditionally focused on optimizing comput...
01/19/2023

OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads

Traffic analysis attacks remain a significant problem for online securit...