A Taxonomy for and Analysis of Anonymous Communications Networks
Total Page:16
File Type:pdf, Size:1020Kb
Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 3-18-2009 A Taxonomy for and Analysis of Anonymous Communications Networks Douglas J. Kelly Follow this and additional works at: https://scholar.afit.edu/etd Part of the Digital Communications and Networking Commons, and the Information Security Commons Recommended Citation Kelly, Douglas J., "A Taxonomy for and Analysis of Anonymous Communications Networks" (2009). Theses and Dissertations. 2539. https://scholar.afit.edu/etd/2539 This Dissertation is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. to A TAXONOMY FOR AND ANALYSIS OF ANONYMOUS COMMUNICATIONS NETWORKS DISSERTATION Douglas Kelly, GG-14 AFIT/DCS/ENG/09-08 AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED The views expressed in this dissertation are those of the author and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the U.S. Government. A TAXONOMY FOR AND ANALYSIS OF ANONYMOUS COMMUNICATIONS NETWORKS DISSERTATION Presented to the Faculty Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Douglas J. Kelly, BS, MS, MBA March 2009 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/DCS/ENG/09-08 A TAXONOMY FOR AND ANALYSIS OF ANONYMOUS COMMUNICATIONS NETWORKS DISSERTATION Douglas J. Kelly, BS, MS, MBA Approved: __________//SIGNED//________________ _16 Mar 09_ Dr. Richard A. Raines (Chairman) Date __________//SIGNED//________________ _16 Mar 09_ Dr. Barry E. Mullins (Member) Date __________//SIGNED//________________ _16 Mar 09_ Dr. Rusty O. Baldwin (Member) Date __________//SIGNED//________________ _16 Mar 09_ Dr. Michael R. Grimaila (Member) Date Accepted: __________//SIGNED//________________ _18 Mar 09_ Dr. M. U. Thomas Date Dean, Graduate School of Engineering and Management - iii - AFIT/DCS/ENG/09-08 Abstract Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama’s Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity of new surveillance technologies in cyberspace enables instant, undetectable, and unsolicited information collection about entities. Hence, anonymity and privacy are becoming increasingly important issues. Anonymization enables entities to protect their data and systems from a diverse set of cyber attacks and preserves privacy. This research provides a systematic analysis of anonymity degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of identities and actions of/from potential adversaries. First, novel taxonomies are developed for classifying and comparing well-established anonymous networking protocols. These expand the classical definition of anonymity and capture the peer-to-peer and mobile ad hoc anonymous protocol family relationships. Second, a unique synthesis of state-of- the-art anonymity metrics is provided. This significantly aids an entity’s ability to reliably measure changing anonymity levels; thereby, increasing their ability to defend against cyber attacks. Finally, a novel epistemic-based mathematical model is created to characterize how an adversary reasons with knowledge to degrade anonymity. This offers multiple anonymity property representations and well-defined logical proofs to ensure the accuracy and correctness of current and future anonymous network protocol design. - iv - AFIT/DCS/ENG/09-08 Acknowledgments Special thanks go to my advisor and committee members who were extremely supportive during some very difficult times while pursuing this degree. Succinctly, my committee members and agency executive support enabled me to grow professionally and contribute eight academic papers in my field. Most PhD candidates deservedly praise their wives and/or significant others for their tremendous love, support, and understanding while advancing their career. I am able to attest to the significant advantage such support provides for I had no such personal support to draw strength from. Nonetheless, I acknowledge God for giving me the fortitude to continue to make progress in my studies and ultimately become successful during this challenging but rewarding academic experience. v AFIT/DCS/ENG/09-08 Table of Contents Abstract .............................................................................................................................. iv Acknowledgments.............................................................................................................. iv Table of Contents ............................................................................................................... vi List of Figures .................................................................................................................. xiv List of Tables ................................................................................................................... xiv List of Acronyms .............................................................................................................. xv I. Introduction ................................................................................................................. 1 1.0 Background .......................................................................................................... 1 1.1 Problem Statement ............................................................................................... 3 1.2 Research Objectives ............................................................................................. 4 1.3 Assumptions/Limitations ..................................................................................... 5 1.4 Implications.......................................................................................................... 6 1.5 Summary .............................................................................................................. 6 II. Literature Review........................................................................................................ 8 2.0 Chapter Overview ................................................................................................ 8 2.1 Background .......................................................................................................... 8 2.1.1 Privacy. ......................................................................................................... 9 2.1.2 Identity. ....................................................................................................... 11 2.1.3 Anonymity. ................................................................................................. 11 2.1.3.1 Advantages. .......................................................................................... 13 2.1.3.2 Disdvantages. ....................................................................................... 15 2.1.4 Pseudonymity. ............................................................................................. 17 2.1.5 Reputation. .................................................................................................. 18 2.1.5.1 eBay. .................................................................................................... 18 2.2 Nomenclature ..................................................................................................... 19 2.2.1 Fundamental Anonymity Properties. .......................................................... 19 2.2.2 The Adversary. ............................................................................................ 23 2.2.3 The Attacks. ................................................................................................ 24 2.2.4 The Mix. ...................................................................................................... 27 2.3 Anonymous Networks ....................................................................................... 33 vi AFIT/DCS/ENG/09-08 2.3.1 Wired Networks. ......................................................................................... 34 2.3.1.1 Anonymizer.......................................................................................... 34 2.3.1.2 Java Anon Proxy. ................................................................................. 35 2.3.1.3 PipeNet. ................................................................................................ 35 2.3.1.4 Onion Routing (Tor). ........................................................................... 36 2.3.1.5 Freedom Network. ..............................................................................