Forensic Investigation of the OneSwarm Anonymous Filesharing System

被引:0
|
作者
Prusty, Swagatika [1 ]
Levine, Brian Neil [1 ]
Liberatore, Marc [1 ]
机构
[1] Univ Massachusetts Amherst, Dept Comp Sci, Amherst, MA 01003 USA
关键词
Digital Forensics; Child Sexual Exploitation; P2P Networks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate several flaws in OneSwarm's design and implementation through three different attacks available to forensic investigators. First, we prove that the current design is vulnerable to a novel timing attack that allows just two attackers attached to the same target to determine if it is the source of queried content. When attackers comprise 15% of OneSwarm peers, we expect over 90% of remaining peers will be attached to two attackers and therefore vulnerable. Thwarting the attack increases OneSwarm query response times, making them longer than the equivalent in Onion Routing. Second, we show that OneSwarm's vulnerability to traffic analysis by colluding attackers is much greater than was previously reported, and is much worse than Onion Routing. We show for this second attack that when investigators comprise 25% of peers, over 40% of the network can be investigated with 80% precision to find the sources of content. Our examination of the One-Swarm source code found differences with the technical paper that significantly reduce security. For the implementation in use by thousands of people, attackers that comprise 25% of the network can successfully use this second attack against 98% of remaining peers with 95% precision. Finally, we show that a novel application of a known TCP-based attack allows a single attacker to identify whether a neighbor is the source of data or a proxy for it. Users that turn off the default rate-limit setting are exposed. Each attack can be repeated as investigators leave and rejoin the network. All of our attacks are successful in a forensics context: Law enforcement can use them legally ahead of a warrant. Furthermore, private investigators, who have fewer restrictions on their behavior, can use them more easily in pursuit of evidence for such civil suits as copyright infringement.
引用
收藏
页码:201 / 213
页数:13
相关论文
共 50 条
  • [1] Forensic Identification of Anonymous Sources in OneSwarm
    Bissias, George
    Levine, Brian Neil
    Liberatore, Marc
    Prusty, Swagatika
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 620 - 632
  • [2] Censorship-resistant and anonymous P2P filesharing
    Endsuleit, Regine
    Mie, Thilo
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 58 - +
  • [3] Mining writeprints from anonymous e-mails for forensic investigation
    Iqbal, Farkhund
    Binsalleeh, Hamad
    Fung, Benjamin C. M.
    Debbabi, Mourad
    DIGITAL INVESTIGATION, 2010, 7 (1-2) : 56 - 64
  • [4] Forensic examination of anonymous letters
    Limborgh, JCM
    FORENSIC SCIENCE INTERNATIONAL, 2003, 136 : 130 - 131
  • [5] Forensic Recovery of File System Metadata for Digital Forensic Investigation
    Oh, Junghoon
    Lee, Sangjin
    Hwang, Hyunuk
    IEEE ACCESS, 2022, 10 : 111591 - 111606
  • [6] A Forensic Investigation of the Robot Operating System
    Abeykoon, Iroshan
    Feng, Xiaohua
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 851 - 857
  • [7] A Forensic Investigation of Robot Operating System
    Abeykoon, Iroshan
    Feng, Xiaohua
    Qiu, Renxi
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 368 - 372
  • [8] Modular robotic system for forensic investigation support
    Kowalski, Grzegorz
    Glowka, Jakub
    Macias, Mateusz
    Puchalski, Slawomir
    COUNTERTERRORISM, CRIME FIGHTING, FORENSICS, AND SURVEILLANCE TECHNOLOGIES, 2017, 10441
  • [9] Experience with an object reputation system for peer-to-peer filesharing
    Walsh, Kevin
    Sirer, Emin Gun
    USENIX ASSOCIATION PROCEEDINGS OF THE 3RD SYMPOSIUM ON NETWORKED SYSTEMS DESIGN & IMPLEMENTATION (NSDI 06), 2006, : 1 - +
  • [10] A survey on forensic investigation of operating system logs
    Studiawan, Hudan
    Sohel, Ferdous
    Payne, Christian
    DIGITAL INVESTIGATION, 2019, 29 : 1 - 20