TY - GEN
T1 - Breaking the collusion detection mechanism of MorphMix
AU - Tabriz, Parisa
AU - Borisov, Nikita
PY - 2006
Y1 - 2006
N2 - MorphMix is a peer-to-peer circuit-based mix network designed to provide low-latency anonymous communication. MorphMix nodes incrementally construct anonymous communication tunnels based on recommendations from other nodes in the system; this P2P approach allows it to scale to millions of users. However, by allowing unknown peers to aid in tunnel construction, MorphMix is vulnerable to colluding attackers that only offer other attacking nodes in their recommendations. To avoid building corrupt tunnels, MorphMix employs a collusion detection mechanism to identify this type of misbehavior. In this paper, we challenge the assumptions of the collusion detection mechanism and demonstrate that colluding adversaries can compromise a significant fraction of all anonymous tunnels, and in some cases, a majority of all tunnels built. Our results suggest that mechanisms based solely on a node's local knowledge of the network are not sufficient to solve the difficult problem of detecting colluding adversarial behavior in a P2P system and that more sophisticated schemes may be needed.
AB - MorphMix is a peer-to-peer circuit-based mix network designed to provide low-latency anonymous communication. MorphMix nodes incrementally construct anonymous communication tunnels based on recommendations from other nodes in the system; this P2P approach allows it to scale to millions of users. However, by allowing unknown peers to aid in tunnel construction, MorphMix is vulnerable to colluding attackers that only offer other attacking nodes in their recommendations. To avoid building corrupt tunnels, MorphMix employs a collusion detection mechanism to identify this type of misbehavior. In this paper, we challenge the assumptions of the collusion detection mechanism and demonstrate that colluding adversaries can compromise a significant fraction of all anonymous tunnels, and in some cases, a majority of all tunnels built. Our results suggest that mechanisms based solely on a node's local knowledge of the network are not sufficient to solve the difficult problem of detecting colluding adversarial behavior in a P2P system and that more sophisticated schemes may be needed.
UR - http://www.scopus.com/inward/record.url?scp=77049097177&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77049097177&partnerID=8YFLogxK
U2 - 10.1007/11957454_21
DO - 10.1007/11957454_21
M3 - Conference contribution
AN - SCOPUS:77049097177
SN - 3540687904
SN - 9783540687900
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 368
EP - 383
BT - Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Revised Selected Papers
T2 - 6th International Workshop on Privacy Enhancing Technologies, PET 2006
Y2 - 28 June 2006 through 30 June 2006
ER -