COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Peer-to-peer network topologies and anonymity
Peer-to-peer network topologies and anonymityAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Saar Drimer. Peer-to-peer networks, due to their decentralized construction, are a natural platform for anonymous communication and large-scale p2p networks may be the key to widespread deployment of anonymous communications technologies. In order to be scalable, however, p2p networks must maintain a limited view of the network, thereby creating a restricted topology graph of nodes that can communicate with each other. As all communication must follow paths within the graph, we study the information that can be learned about the origin of a path based on observing intermediate nodes. We use both graph models and simulations in our analysis. In our work, we contrast structured networks, where the topology of the graph follows a mathematical model, and unstructured ones, where arbitrary connections can be made. Unstructured networks often develop an emergent power-law topology; we have found that such topologies are a detriment for anonymity because they have poor mixing (paths remaining correlated to their starting point after a large number of hops) and because the high-degree nodes can be subject to a targeted attack. We show that effective attacks against such networks can be carried out with only a moderate number of compromised nodes and without a global view of the network topology. Structured networks, on the other hand, tend to have good mixing properties, and de Bruijn networks can be shown to achieve optimal mixing and therefore make an ideal candidate for anonymous p2p networks. We study the approximations to de Bruijn networks used in several p2p systems and show that they provide good anonymity on average, and acceptable anonymity in the worst case, even when the full topology of the network is known to the attackers. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsThe Partition of Ukraine: A Nightmare Physics of Living Matter lectures CASP seminar seriesOther talks'Politics in Uncertain Times: What will the world look like in 2050 and how do you know? Multi-scale observations of ocean circulation in the Atlantic Optimising fresh produce quality monitoring and analysis Britain, Jamaica and the modern global financial order, 1800-50 Developing an optimisation algorithm to supervise active learning in drug discovery Autumn Cactus & Succulent Show Direct measurements of dynamic granular compaction at the mesoscale using synchrotron X-ray radiography LARMOR LECTURE - Exoplanets, on the hunt of Universal life An approach to the four colour theorem via Donaldson- Floer theory Intelligent Self-Driving Vehicles |