Location Diversity in Anonymity Networks. Feamster, N. & Dingledine, R. October 2004.
Location Diversity in Anonymity Networks [link]Paper  doi  abstract   bibtex   
Anonymity networks have long relied on diversity of node location for protection against attacks–-typically an adversary who can observe a larger fraction of the network can launch a more effective attack. We investigate the diversity of two deployed anonymity networks, Mixmaster and Tor, with respect to an adversary who controls a single Internet administrative domain. Specifically, we implement a variant of a recently proposed technique that passively estimates the set of administrative domains (also known as autonomous systems, or ASes) between two arbitrary end-hosts without having access to either end of the path. Using this technique, we analyze the AS-level paths that are likely to be used in these anonymity networks. We find several cases in each network where multiple nodes are in the same administrative domain. Further, many paths between nodes, and between nodes and popular endpoints, traverse the same domain.
@conference {feamster:wpes2004,
	title = {Location Diversity in Anonymity Networks},
	booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)},
	year = {2004},
	month = {October},
	address = {Washington, DC, USA},
	abstract = {Anonymity networks have long relied on diversity of node location for protection against attacks---typically an adversary who can observe a larger fraction of the network can launch a more effective attack. We investigate the diversity of two deployed anonymity networks, Mixmaster and Tor, with respect to an adversary who controls a single Internet administrative domain.

Specifically, we implement a variant of a recently proposed technique that passively estimates the set of administrative domains (also known as autonomous systems, or ASes) between two arbitrary end-hosts without having access to either end of the path. Using this technique, we analyze the AS-level paths that are likely to be used in these anonymity networks. We find several cases in each network where multiple nodes are in the same administrative domain. Further, many paths between nodes, and between nodes and popular endpoints, traverse the same domain.},
	keywords = {anonymity, autonomous systems},
	doi = {10.1145/1029179.1029199},
	url = {http://portal.acm.org/citation.cfm?id=1029199},
	author = {Nick Feamster and Roger Dingledine}
}

Downloads: 0