DocumentCode
3603550
Title
How to Find Hidden Users: A Survey of Attacks on Anonymity Networks
Author
Erdin, Esra ; Zachor, Chris ; Gunes, Mehmet Hadi
Author_Institution
Dept. of Comput. Sci. & Eng., Univ. of Nevada, Reno, NV, USA
Volume
17
Issue
4
fYear
2015
Firstpage
2296
Lastpage
2316
Abstract
Communication privacy has been a growing concern, particularly with the Internet becoming a major hub of our daily interactions. Revelations of government tracking and corporate profiling have resulted in increasing interest in anonymous communication mechanisms. Several systems have been developed with the aim of preserving communication privacy via unlinkability within a public network environment such as Tor and I2P. As the anonymity networks cannot guarantee perfect anonymity, it is important for users to understand the risks they might face when utilizing such technologies. In this paper, we discuss potential attacks on the anonymity networks that can compromise user identities and communication links. We also summarize protection mechanisms against such attacks. Many attacks against anonymity networks are well studied, and most of the modern systems have built-in mechanisms to prevent these attacks. Additionally, some of the attacks require considerable resources to be effective and hence are very unlikely to succeed against modern anonymity networks.
Keywords
Internet; computer network security; data privacy; Internet; anonymity networks; anonymous communication mechanisms; communication links; communication privacy; corporate profiling; government tracking; hidden users; protection mechanisms; public network environment; Communication systems; Encryption; Government policies; IP networks; Internet; Privacy; Anonymity; Anonymous Communication; Onion Routing; Privacy; anonymous communication; onion routing; privacy;
fLanguage
English
Journal_Title
Communications Surveys Tutorials, IEEE
Publisher
ieee
ISSN
1553-877X
Type
jour
DOI
10.1109/COMST.2015.2453434
Filename
7152825
Link To Document