Novel Packet Size-Based Covert Channel Attacks against Anonymizer

被引:22
作者
Ling, Zhen [1 ]
Fu, Xinwen [2 ]
Jia, Weijia [3 ]
Yu, Wei [4 ]
Xuan, Dong [5 ]
Luo, Junzhou [1 ]
机构
[1] Southeast Univ, Sch Comp Sci & Engn, Nanjing 211189, Jiangsu, Peoples R China
[2] Univ Massachusetts, Dept Comp Sci, Lowell, MA 01854 USA
[3] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[4] Towson Univ, Dept Comp & Informat Sci, Towson, MD 21252 USA
[5] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
基金
美国国家科学基金会;
关键词
Anonymizer; watermark; TCP dynamics;
D O I
10.1109/TC.2012.169
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial anonymous communication system. We discovered the architecture of Anonymizer and found that the size of web packets in the Anonymizer network can be very dynamic at the client. Motivated by this finding, we investigated a class of novel packet size-based covert channel attacks against Anonymizer. The attacker between a website and the Anonymizer server can manipulate the web packet size and embed secret signal symbols into the target traffic. An accomplice at the user side can sniff the traffic and recognize the secret signal. In this way, the anonymity provided by Anonymizer is compromised. We developed intelligent and robust algorithms to cope with the packet size distortion incurred by Anonymizer and Internet. We developed techniques to make the attack harder to detect: 1) We pick up right packets of web objects to manipulate to preserve the regularity of the TCP packet size dynamics, which can be measured by the Hurst parameter; 2) We adopt the Monte Carlo sampling technique to preserve the distribution of the web packet size despite manipulation. We have implemented the attack over Anonymizer and conducted extensive analytical and experimental evaluations. It is observed that the attack is highly efficient and requires only tens of packets to compromise the anonymous web surfing via Anonymizer. The experimental results are consistent with our theoretical analysis.
引用
收藏
页码:2411 / 2426
页数:16
相关论文
共 42 条
[1]  
[Anonymous], 4253 RFC
[2]  
[Anonymous], 2011, AD FLASH PLAYER
[3]  
[Anonymous], TECHNICAL REPORT
[4]  
[Anonymous], 2004, P USENIX SEC S
[5]  
Bauer K., 2007, P ACM WORKSH PRIV EL
[6]  
Beran J., 1994, Statistics for Long-Memory Processes
[7]  
Choi H-K, 1999, P IEEE INT C NETW PR
[8]  
Clegg R. G., 2005, P 21 UK PERF ENG WOR, VCS-TR-916
[9]  
Cox Ingemar, 2007, Digital watermarking and steganography
[10]  
Dai W., 2011, PIPENET 1 1