Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Research unmasks anonymity networks

They know who you are after all.

Article comments

Anonymity systems designed to allow users to carry out actions on the Internet without identifying themselves can often be cracked with a bit of unorthodox thinking, according to a Cambridge researcher.

Stephen Murdoch, a researcher in the University of Cambridge's Security Group, outlined a number of different anonymity-cracking techniques in a recently published PhD thesis.

The techniques aim at removing the cloak provided by anonymity systems such as Tor, which can be used by legitimate users looking to protect their identities, as well as by criminals covering their tracks.

Murdoch has tested his techniques whenever possible, and his results show that even supposedly infallible techniques can often be defeated by exploiting real-world weaknesses in the systems.

One technique explored in the paper, called indirect traffic analysis, relies on examining the actions of an anonymous user, through which the user's intent and often their identity can be inferred, according to Murdoch.

For example, if an attacker is able to modify certain characteristics of an anonymised data stream coming through an anonymisation network such as Tor, the attacker can often discover the first Tor node connected to by the client, Murdoch said.

"This reduces the anonymity provided to that of a single-hop proxy, and then mundane legal mechanisms might be used to discover the initiator," Murdoch wrote.

In experimenting with such techniques on Tor, Murdoch said he was able to de-anonymise 11 out of the 13 Tor nodes tested.

One of the more outré techniques examined in the paper explores the link between processor load and the behaviour of the system's clock crystal - its "clock skew." This is because when the processor is undergoing a greater load, it is emitting more heat, which in turn affects the temperature of the clock crystal.

The link has been examined since the early 1990s in the security community, but Murdoch's innovation is to deliberately induce a pattern of processor load in an anonymous service, and use the resulting clock skew data to determine the identity of the service.

"Such an attack could be deployed in practice by an attacker using one machine to access the hidden service, varying traffic over time to cause the server to heat up or cool down," Murdoch wrote.

"Simultaneously, he probes all candidate machines for timestamps. From these the attacker infers clock skew estimates and when a correlation between the skew and the induced load pattern is found, the hidden service is de-anonymised," he wrote.

Such an attack is unlikely to be the fastest way to de-anonymise users of anonymity networks, Murdoch conceded, but he expects interest in and use of such techniques to grow.

"As systems become hardened against more conventional attacks, this attack could become a plausible threat," he wrote.



Share:

More from Techworld

More relevant IT news

Comments

LV said: Interesting in a lab and for aPhD thesis completely impractical in the real world Id consider this info useless



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *