Abstract
Mixnets are a fundamental privacy enhancing technology in the context of anonymous communication that have been extensively studied in terms of a Global passive Adversary (GPA). However a more realistic adversary that captures only a portion of the network have not yet been studied. We call these adversaries “Adversaries with Partial Visibility (APV)" In this paper we provide a framework that models the mixnet-based system and captures different types of Adversaries with Partial Visibility. Each adversary is modeled based on their goals, prior knowledge, and capabilities. We then use this model to perform traffic analysis using the Metropolis-Hastings algorithm in conjunction with a Bayesian inference engine. To the best of our knowledge this is the first time such an adversary is explicitly defined and studied, despite this adversary model being championed as more realistic than global passive adversaries in prior work. We highlight that our framework is flexible and able to encompass a broad range of different adversaries. Naturally, our model also captures the classical global passive adversary (GPA) as a special case.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ben Guirat, I., Gosain, D., Diaz, C.: MiXiM: mixnet design decisions and empirical evaluation. In: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, pp. 33–37 (2021)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981). https://doi.org/10.1145/358549.358563, http://doi.acm.org/10.1145/358549.358563
Danezis, G.: Statistical disclosure attacks. In: Gritzalis, D., De Capitani di Vimercati, S., Samarati, P., Katsikas, S. (eds.) SEC 2003. ITIFIP, vol. 122, pp. 421–426. Springer, Boston, MA (2003). https://doi.org/10.1007/978-0-387-35691-4_40
Danezis, G.: The traffic analysis of continuous-time mixes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 35–50. Springer, Heidelberg (2005). https://doi.org/10.1007/11423409_3
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type III anonymous remailer protocol. In: Symposium on Security and Privacy, pp. 2–15. IEEE (2003)
Danezis, G., Troncoso, C.: Vida: how to use Bayesian inference to de-anonymize persistent communications. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 56–72. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03168-7_4
Diaz, C., Halpin, H., Kiayias, A.: The NYM network (2021). https://nymtech.net/nym-whitepaper.pdf
Gallagher, K., Barradas, D., Santos, N.: Rethinking realistic adversaries for anonymous communication systems. In: Free and Open Communications on the Internet, FOCI’23, pp. 81–87 (2023). https://petsymposium.org/foci/2023/foci-2023-0015.pdf
Hastings, W.K.: Monte Carlo Sampling Methods Using Markov Chains and Their Applications. Oxford University Press, Oxford (1970)
Kesdogan, D., Mölle, D., Richter, S., Rossmanith, P.: Breaking anonymity by learning a unique minimum hitting set. In: Frid, A., Morozov, A., Rybalchenko, A., Wagner, K.W. (eds.) CSR 2009. LNCS, vol. 5675, pp. 299–309. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03351-3_28
Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 326–339. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30114-1_23
Kwon, A., Lu, D., Devadas, S.: \(\{\)XRD\(\}\): scalable messaging system with cryptographic privacy. In: 17th \(\{\)USENIX\(\}\) Symposium on Networked Systems Design and Implementation (\(\{\)NSDI\(\}\) 20), pp. 759–776 (2020)
Piotrowska, A.M.: Studying the anonymity trilemma with a discrete-event mix network simulator. In: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, pp. 39–44 (2021)
Piotrowska, A.M., Hayes, J., Elahi, T., Meiser, S., Danezis, G.: The Loopix anonymity system. In: 26th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 17), pp. 1199–1216 (2017)
Raymond, J.-F.: Traffic analysis: protocols, attacks, design issues, and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44702-4_2
Syverson, P.: Why I’m not an Entropist. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 213–230. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36213-2_25
Troncoso, C., Danezis, G.: The Bayesian traffic analysis of mix networks. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 369–379. CCS ’09, Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1653662.1653707
Van Den Hooff, J., Lazar, D., Zaharia, M., Zeldovich, N.: Vuvuzela: scalable private messaging resistant to traffic analysis. In: Proceedings of the 25th Symposium on Operating Systems Principles, pp. 137–152 (2015)
Wallis, S.: Binomial confidence intervals and contingency tests: mathematical fundamentals and the evaluation of alternative methods. J. Quant. Linguist. 20(3), 178–208 (2013)
Wilson, E.B.: Probable inference, the law of succession, and statistical inference. J. Am. Stat. Assoc. 22(158), 209–212 (1927)
Acknowledgement
We thank the anonymous reviewers for their comments and insightful feedback. This research is partially supported by the Research Council KU Leuven under the grant C24/18/049, by CyberSecurity Research Flanders with reference number VR20192203, and by DARPA FA8750-19-C-0502. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of any of the funding agencies.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A System Model: Topology
1.1 A.1 Topology
B Probability of a Trace: Mixes Are Not Chosen Uniformly
Depending in the systems requirements, mixes can be chosen according to a certain weights assigned to them. We now consider the case of mixes not chosen uniformly, but according to an assigned weight. Mix weights can reflect geographic approximation, bandwidth, trust etc. Let’s denote by \(w(\mu _{j,l_i})\) the probability of the mix \(\mu _{j,l_i}\) being chosen among the set of mixes in layer \(l_i\). The probability of each path becomes (Fig. 6):
We can also model the case when each sender \(s_i\) only knows a subset of the mixes in each layer \(l_j\) (\(\mathcal {S}(s_i, l_j)\)).
To compute \(\texttt {Pr}[\mu _{j_{i},i}|\mathcal {S}(s_i, l_j)]\), we need to divide the weight of mix \(\mu _{j_{i},i}\) by the sum of the weights of the all the mixes in layer \(l_i\) that sender \(s_i\) knows.
Therefore:
Recipient Probability. The recipient probability \(Pr[r_i]\) captures any prior knowledge of the adversary about the relationship between a specific sender and a specific receiver, for example if the adversary has a prior knowledge about friendship graphs of certain senders (i.e. sender \(s_1\) is twice as likely to send a message to receiver \(r_1\) than to a receiver \(r_2\)).
C Constraints in Sampling
Depending on the network configuration as well as the adversary capabilities, some samples states are not possible therefore are thrown away in the Metropolis Hastings algorithm. In order for our model to be accurate we incorporate two categories of these impossible states:
Ghost Messages: In prior work using the Metropolis-Hasting algorithm [4], the authors acknowledge that one of the limitation of their model is assuming that the adversary starts observing the network when the all mixes are empty. We argue however that this is not realistic. Instead the adversary starts observing the network when there are already messages inside the mixes and those message contribute in hiding an item of interest. We model this scenario by ghost messages. Not to be confused with dummy or cover traffic, ghost messages gm are an output message whose inputs are outside the observation of the adversary and therefore are not items of interests but they do play a role in hiding an item of interest. We therefore add vertices to the subgraph associated with the matrix.
Routing: When an adversary is monitoring or compromising a mix, not only do the have knowledge about the input and output messages of that mix but also the destination and source mixes of those messages. We model this by a list of rules. Any sampled state that is the result of a violations of these rules will be thrown away.
D Table of Notation
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Guirat, I.B., Diaz, C., Eldefrawy, K., Zeilberger, H. (2024). Traffic Analysis by Adversaries with Partial Visibility. In: Tsudik, G., Conti, M., Liang, K., Smaragdakis, G. (eds) Computer Security – ESORICS 2023. ESORICS 2023. Lecture Notes in Computer Science, vol 14345. Springer, Cham. https://doi.org/10.1007/978-3-031-51476-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-51476-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-51475-3
Online ISBN: 978-3-031-51476-0
eBook Packages: Computer ScienceComputer Science (R0)