Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Detection and analysis of eavesdropping in anonymous communication networks
Chakravarty S., Portokalidis G., Polychronakis M., Keromytis A. International Journal of Information Security14 (3):205-220,2015.Type:Article
Date Reviewed: Oct 6 2015

Have you ever used an anonymizing overlay network? And even if you haven’t, how much trust would you put in one? The Tor network is getting a large number of users (500,000+), but what are the associated privacy risks?

This paper describes an experiment the authors conducted over a long period of time (30 months), passing unencrypted decoy credentials through all Tor exit nodes (separate credentials per node), using honeypot-like servers to detect any illegitimate use of these credentials.

The paper provides a good background on both anonymizing overlay networks and eavesdropping detection, and describes the experiment in great detail--though maybe too much, with “Introduction,” “Background,” and “System Architecture” sections repeating parts over the first eight pages.

The paper elaborates on the 18 incidents recorded. Interesting insights into how the experiment evolved based on earlier observations are also presented (for example, adding an SSH honeypot after attempts to reuse eavesdropped Internet message access protocol (IMAP) credentials with SSH). There are also interesting behavioral aspects of both the experiment design (realistic use of decoy credentials) as well as the response of malicious node operators (nodes being taken down after decoy credential use); unfortunately, the paper does not elaborate on these further.

Overall, it was an interesting read, though my expectations were higher given the length of the paper.

Reviewer:  Vladimir Mencl Review #: CR143822 (1512-1053)
Bookmark and Share
  Featured Reviewer  
 
Data Encryption (E.3 )
 
 
Coding And Information Theory (E.4 )
 
 
Computer-Communication Networks (C.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy