TY - GEN
T1 - gPath
T2 - 1st International Conference on Decision and Game Theory for Security, GameSec 2010
AU - Zhang, Nan
AU - Yu, Wei
AU - Fu, Xinwen
AU - Das, Sajal K.
PY - 2010/12/1
Y1 - 2010/12/1
N2 - In this paper, we address the problem of defending against entry-exit linking attacks in Tor, a popular anonymous communication system. We formalize the problem as a repeated non-cooperative game between the defender and the adversary (i.e., controller of the compromised Tor nodes to carry out entry-exit linking attacks). Given the current path selection algorithm of Tor, we derive an optimal attack strategy for the adversary according to its utility function, followed by an optimal defensive strategy against this attack. We then repeat such interactions for three additional times, leading to three design principles, namely stratified path selection, bandwidth order selection, and adaptive exit selection. We further develop gPath, a path selection algorithm that integrates all three principles to significantly reduce the success probability of linking attacks. Using a combination of theoretical analysis and experimental studies on real-world Tor data, we demonstrate the superiority of our algorithm over the existing ones.
AB - In this paper, we address the problem of defending against entry-exit linking attacks in Tor, a popular anonymous communication system. We formalize the problem as a repeated non-cooperative game between the defender and the adversary (i.e., controller of the compromised Tor nodes to carry out entry-exit linking attacks). Given the current path selection algorithm of Tor, we derive an optimal attack strategy for the adversary according to its utility function, followed by an optimal defensive strategy against this attack. We then repeat such interactions for three additional times, leading to three design principles, namely stratified path selection, bandwidth order selection, and adaptive exit selection. We further develop gPath, a path selection algorithm that integrates all three principles to significantly reduce the success probability of linking attacks. Using a combination of theoretical analysis and experimental studies on real-world Tor data, we demonstrate the superiority of our algorithm over the existing ones.
UR - http://www.scopus.com/inward/record.url?scp=78650752584&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650752584&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-17197-0_4
DO - 10.1007/978-3-642-17197-0_4
M3 - Conference contribution
AN - SCOPUS:78650752584
SN - 3642171966
SN - 9783642171963
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 58
EP - 71
BT - Decision and Game Theory for Security - First International Conference, GameSec 2010, Proceedings
Y2 - 22 November 2010 through 23 November 2010
ER -