Palmieri, P., 2016. Anonymity Networks and Access to Information During Conflicts: Towards a Distributed Network Organisation. In: 8th International Conference on Cyber Conflict (CyCon 2016): Cyber Power, 31 May-3 June 2016, Tallinn, Estonia, 263 - 275.
Full text available as:
|
PDF
Palmieri_CyCon2016.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 1MB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
Official URL: https://ccdcoe.org/cycon/
Abstract
Access to information is crucial during conflicts and other critical events such as population uprisings. An increasing number of social interactions happen in the cyberspace, while information exchanges at the infrastructural level (monitoring systems, sensor networks, etc.) are now also based on Internet and wireless links rather than ad hoc, isolated wired networks. However, the nature of the Internet allows powerful hostile actors to block, censor, or redirect communication to and from specific Internet services, through a number of available techniques. Anonymity networks such as Tor provide a way to circumvent traditional strategies for restricting access to online resources, and make communication harder to trace and identify. Tor, in particular, has been successfully used in past crises to evade censorship and Internet blockades (Egypt in 2011, and Iran in 2012). Anonymity networks can provide essential communication tools during conflicts, allowing information exchanges to be concealed from external observers, anonymised, and made resilient to imposed traffic controls and geographical restrictions. However, the design of networks such as Tor makes them vulnerable to large-scale denial of service attacks, as shown by the DDoS targeted at Tor hidden services in March 2015. In this paper, we analyse the structural weaknesses of Tor with regard to denial of service attacks, and propose a number of modifications to the structure of the Tor network aimed at improving its resilience to a large coordinated offensive run by a hostile actor in a conflict scenario. In particular, we introduce novel mechanisms that allow relay information to be propagated in a distributed and peer-to-peer manner. This eliminates the need for directory services, and allows the deployment of Tor-like networks in hostile environments, where centralised control is impossible. The proposed improvements concern the network organisation, but preserve the underlying onion routing mechanism that is at the base of Tor’s anonymity.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Uncontrolled Keywords: | Tor ; Anonymous networks ; Peer-to-peer ; Denial of service ; DDoS |
Group: | Faculty of Science & Technology |
ID Code: | 24444 |
Deposited By: | Symplectic RT2 |
Deposited On: | 30 Aug 2016 11:30 |
Last Modified: | 14 Mar 2022 13:57 |
Downloads
Downloads per month over past year
Repository Staff Only - |