The second half of the COMSYS 316 course focuses on crucial topics related to network security, with an emphasis on network anonymity and privacy. This segment will explore several key areas including network intrusion detection and prevention systems, firewalls, IoT, cloud security, and briefly touch on blockchain technology.
Network anonymity pertains to the techniques and technologies that allow users to conceal their identities on digital platforms. The goal is to ensure the sender and receiver of communications remain unidentified, which is critical for various reasons.
Free Speech:Individuals must feel secure expressing political views or opinions without fear of repercussions. Anonymity can protect individuals from negative social or professional impacts based on their expressed beliefs.
Whistleblowing:Whistleblowers often expose unethical or illegal behaviors within organizations. Protecting their identities can prevent retaliation and support the disclosure of important information.
Activism and Journalism:Journalists and activists often require anonymity to safely report on sensitive issues or to communicate without censorship.
Avoiding Tracking:With increasing surveillance practices, individuals often seek ways to shield their online activities from companies that track consumer behavior.
While anonymity serves many positive functions, it can also be exploited for nefarious purposes, including:
Disclosing Trade Secrets:Malicious actors may hide their identities to illegally share sensitive corporate information.
DDoS Attacks:Attackers may launch Distributed Denial of Service attacks while remaining anonymous, complicating efforts to trace the source of the attack.
Other Illegal Activities:Such as piracy, scams, and hacking.
Anonymity can be measured through anonymity sets, which consist of potential senders of a message. The larger the set, the lower the probability of identifying a specific user. This concept is closely related to k-anonymity, where increasing the number of users in a set strengthens anonymity.
Despite the goal of anonymity, entities can often still track internet users. Methods include:
IP Address Tracking:Internet Service Providers (ISPs) retain records of user activities, posing challenges to anonymity.
**Browser Fingerprinting:Tracking devices through unique browser settings, despite efforts to conceal identity.**
**Unlinkability:This refers to the inability to associate entities involved in communication, covering:
**Sender Anonymity:Who sent the message remains unknown.
Receiver Anonymity:Who received the message is concealed.**
Relationship Anonymity:Both sender and receiver identities are protected.
Observability:Communication that cannot be distinguished from other messages. Encryption is a primary tool to achieve this state.
Proxy servers and VPNs serve as intermediaries between users and the internet to enhance anonymity. They can provide sender anonymity while potentially compromising receiver anonymity, depending on the positioning of the eavesdroppers.
Eavesdroppers can utilize statistical methods, such as timing and volume analysis, to attempt to deanonymize users and associate them with their online activities.
To counteract the limitations of traditional proxies, using a set of proxies or a mixed network can significantly enhance anonymity. Each mix shuffles messages and adds layers of encryption, improving overall anonymity.
The Onion Router (Tor) is a prominent tool for facilitating anonymous communication online. It operates using a layered encryption method and volunteers to manage nodes within its network. Users benefit from:
Perfect Forward Secrecy:Enhancing security over time.
Guards for Source Anonymity:The introduction of guard nodes enhances confidentiality.
Onion Services:These services provide relationship anonymity, ensuring that both ends of a communication are undisclosed.
The course will continue to delve deeper into these topics, particularly how Tor improves upon previous mixed networks, and further explore the mechanisms of achieving network anonymity.