Analyzing an Adaptive Reputation Metric for Anonymity Systems
Title | Analyzing an Adaptive Reputation Metric for Anonymity Systems |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Das, Anupam, Borisov, Nikita, Caesar, Matthew |
Conference Name | Proceedings of the 2014 Symposium and Bootcamp on the Science of Security |
Publisher | ACM |
Conference Location | Raleigh, NC, USA |
ISBN Number | 978-1-4503-2907-1 |
Keywords | ACM CCS, anonymity, Concurrency and Timing, Database and Storage Security, Formal Methods and Theory of Security, Foundations, Information Accountability and Usage Control, PID controller, reputation model, Resilient Systems, science of security, security metrics, Tor network |
Abstract | Low-latency anonymity systems such as Tor rely on intermediate relays to forward user traffic; these relays, however, are often unreliable, resulting in a degraded user experience. Worse yet, malicious relays may introduce deliberate failures in a strategic manner in order to increase their chance of compromising anonymity. In this paper we propose using a reputation metric that can profile the reliability of relays in an anonymity system based on users' past experience. The two main challenges in building a reputation-based system for an anonymity system are: first, malicious participants can strategically oscillate between good and malicious nature to evade detection, and second, an observed failure in an anonymous communication cannot be uniquely attributed to a single relay. Our proposed framework addresses the former challenge by using a proportional-integral-derivative (PID) controller-based reputation metric that ensures malicious relays adopting time-varying strategic behavior obtain low reputation scores over time, and the latter by introducing a filtering scheme based on the evaluated reputation score to effectively discard relays mounting attacks. We collect data from the live Tor network and perform simulations to validate the proposed reputation-based filtering scheme. We show that an attacker does not gain any significant benefit by performing deliberate failures in the presence of the proposed reputation framework. |
URL | http://doi.acm.org/10.1145/2600176.2600187 |
DOI | 10.1145/2600176.2600187 |
Citation Key | Das:2014:AAR:2600176.2600187 |
- Concurrency and Timing
- Resilient Systems
- Science of Security
- Foundations
- ACM CCS
- anonymity
- concurrency and timing
- Database and Storage Security
- Formal Methods and Theory of Security
- foundations
- Information Accountability and Usage Control
- PID controller
- Reputation Model
- Resilient Systems
- Science of Security
- Security Metrics
- Tor Network
- ACM CCS
- Database and Storage Security
- Information Accountability and Usage Control
- Formal Methods and Theory of Security
- Security Metrics