Anonymity Networks and Access to Information During Conflicts: Towards a Distributed Network Organisation

Anonymity Networks and Access to Information During Conflicts: Towards a Distributed Network Organisation

2016 8th International Conference on Cyber Conflict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profit or non-commercial Cyber Power purposes is granted providing that copies bear this notice and a full citation on the N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. 2016 © NATO CCD COE Publications, Tallinn Anonymity Networks and Access to Information During Conflicts: Towards a Distributed Network Organisation Paolo Palmieri Department of Computing and Informatics Bournemouth University Poole, United Kingdom [email protected] Abstract: Access to information is crucial during conflicts and other critical events such as population uprisings. An increasing number of social interactions happen in the cyberspace, while information exchanges at the infrastructural level (monitoring systems, sensor networks, etc.) are now also based on Internet and wireless links rather than ad hoc, isolated wired networks. However, the nature of the Internet allows powerful hostile actors to block, censor, or redirect communication to and from specific Internet services, through a number of available techniques. Anonymity networks such as Tor provide a way to circumvent traditional strategies for restricting access to online resources, and make communication harder to trace and identify. Tor, in particular, has been successfully used in past crises to evade censorship and Internet blockades (Egypt in 2011, and Iran in 2012). Anonymity networks can provide essential communication tools during conflicts, allowing information exchanges to be concealed from external observers, anonymised, and made resilient to imposed traffic controls and geographical restrictions. However, the design of networks such as Tor makes them vulnerable to large-scale denial of service attacks, as shown by the DDoS targeted at Tor hidden services in March 2015. In this paper, we analyse the structural weaknesses of Tor with regard to denial of service attacks, and propose a number of modifications to the structure of the Tor network aimed at improving its resilience to a large coordinated offensive run by a hostile actor in a conflict scenario. In particular, we introduce novel mechanisms that allow relay information to be propagated in a distributed and peer-to-peer manner. This eliminates the need for directory services, and 263 allows the deployment of Tor-like networks in hostile environments, where centralised control is impossible. The proposed improvements concern the network organisation, but preserve the underlying onion routing mechanism that is at the base of Tor’s anonymity. Keywords: Tor, anonymous networks, peer-to-peer, denial of service, DDoS 1. INTRODUCTION The nature of computer network protocols allows, in principle, a fairly straightforward geographical and organisational mapping of senders and receivers. This can be done both for more restricted local or wireless networks, as well as for the whole Internet. On a large scale, it is thus possible for a government or an Internet service provider to localise, filter, and monitor data streams directed to a specific web service or to a specific geographical region. Several governments effectively control, monitor, or censor Internet traffic, either during crises or permanently. Internet protocols have not been designed for privacy and anonymity, and therefore Internet users can also be easily traced and identified. This reality has prompted researchers to develop privacy enhancing technologies and anonymity networks, which allow communication to be concealed from external observers, anonymised, and made resilient to control and restrictions. Tor (the ‘onion router’) is arguably the most successful and widespread anonymity network, counting millions of users [10]. The Tor network is independently developed, and runs on a number of volunteer-operated servers. However, development of the Tor software has been funded by a number of governmental organisations, including US Department of State, DARPA, and the Naval Research Laboratory, as well as the Federal Foreign Office of Germany.1 This reflects the interest governments around the world have in anonymity networks, which are often seen as both a useful tool and a potential threat [2]. These conflicting sentiments are well exemplified by the discovery in 2007 by security researcher Dan Egerstad that a number of embassies around the world used Tor for delivering private messages, in order not to rely on the hosting country network infrastructure, while the same governments restricted use of Tor by their own citizens [10]. Access to information is critical during conflicts and crises, when controls and restrictions on the flow of information over the Internet are more likely to be imposed [1]. In particular, the ability to use and deploy anonymity networks can be crucial for enabling communication, especially in hostile settings. A. Onion routing The Tor anonymity network is built on the concept of onion routing. Onion routing was first proposed in 1997 [8], but found widespread use only when implemented in the Tor software in 2002 [5]. The main aim of an onion routing network is to protect users from surveillance and traffic analysis. The identity, location, and network activity of the user are protected by concealing from external observers both the content and routing information of the communication. An onion routing network is therefore a general purpose infrastructure allowing 1 The full list of funders of the Tor project is available on the project’s web page: https://www.torproject.org/ about/sponsors.html.en [January 4, 2016] 264 private communications over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. This is achieved by relaying the user’s traffic, including information about its destination, through virtual circuits composed of three successive relays. In particular, each relay in the circuit only learns the preceding and following step in the path from the user to the destination: because of this, the user remains anonymous to all relays except the first as well as the destination, while the destination of the communication remains secret to all relays except the last. Messages are also repeatedly encrypted in a layered manner, in order to protect the actual content of the communication: a public key encryption scheme is used to encrypt the communication multiple times, using in inverse order the public keys of all the relays in the circuit. Traffic going back from the destination to the user is similarly encrypted, and routed back from the last relay to the first one. B. Onion routing during crises Social media have become an increasingly important mean of communication during crises. In recent years, social media were used extensively in a number of crises, conflicts and uprisings, including the ‘April 6 Youth Movement’ in Egypt in 2008, the post-election crisis in Iran in 2009, the student protests in Austria in 2009, and the uprisings in Tunisia and Egypt in 2011 and subsequent years part of the larger Arab Spring phenomenon [11]. In all these crises, internet censorship was deployed to prevent access to social media, and anonymity networks played a role in re-enabling access to censored resources, influencing how people and other actors organised online, and ultimately behaved on the streets. In particular, Tor was used extensively, showing both its strengths and weaknesses. The Tor network, and consequently the onion routing mechanism, proved to be an effective way of circumventing restrictions and internet blockades, while protecting the identity of its users and the secrecy of the communication. However, the open nature of relay servers, which are publicly advertised, make them vulnerable to targeted attacks that can only be partially mitigated by using bridges (servers allowing access to the Tor network when direct communication with a relay is impossible). The Tor infrastructure is also limited by the relatively small number of active relays and its semi-centralised structure, which promotes running relays as dedicated servers as opposed to a more distributed, peer-to-peer network organisation [9]. This makes it impossible to use onion routing over local (wireless) networks, which can be potentially deployed on the spot during a crisis using low-cost, low power devices. Recent events demonstrated that a different implementation of onion routing based on a decentralised network structure might be more suited for crises and conflict areas, where Tor- like networks need to be deployed in hostile environments, and where centralised control is impossible. C. Onion routing in Wireless Sensor Networks Another field of application for onion routing is Wireless Sensor Networks (WSN). A WSN is composed of a number of sensors, communicating with each other through a wireless channel, and deployed in an environment where they observe physical phenomena [6]. They are being used in a number of military application scenarios, for purposes including monitoring 265 and intelligence. WSN are therefore often deployed in hostile or difficult settings, such as battlefields or conflict areas, and are therefore required to be highly fault tolerant, scalable and decentralised. Because of this, WSN are increasingly designed around a distributed network structure and peer-to-peer primitives,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us