scholarly journals Defending Tor from Network Adversaries: A Case Study of Network Path Prediction

2015 ◽  
Vol 2015 (2) ◽  
pp. 171-187 ◽  
Author(s):  
Joshua Juen ◽  
Aaron Johnson ◽  
Anupam Das ◽  
Nikita Borisov ◽  
Matthew Caesar

Abstract The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems (ASes) and Internet exchanges (IXes), which can observe different overlay hops belonging to the same circuit. We evaluate whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by collecting 17.2 million traceroutes from Tor relays to destinations around the Internet. We compare the collected traceroute paths to predicted paths using state-of-the-art path inference techniques. We find that traceroutes present a very different picture, with the set of ASes seen in the traceroute path differing from the predicted path 80% of the time. We also consider the impact that prediction errors have on Tor security. Using a simulator to choose paths over a week, our traceroutes indicate a user has nearly a 100% chance of at least one compromise in a week with 11% of total paths containing an AS compromise and less than 1% containing an IX compromise when using default Tor selection. We find modifying the path selection to choose paths predicted to be safe lowers total paths with an AS compromise to 0.14% but still presents a 5–11% chance of at least one compromise in a week while making 5% of paths fail, with 96% of failures due to false positives in path inferences. Our results demonstrate more measurement and better path prediction is necessary to mitigate the risk of AS and IX adversaries to Tor.

2021 ◽  
Vol 13 (11) ◽  
pp. 288
Author(s):  
Li Fan ◽  
Wei Li ◽  
Xiaohui Cui

Many deepfake-image forensic detectors have been proposed and improved due to the development of synthetic techniques. However, recent studies show that most of these detectors are not immune to adversarial example attacks. Therefore, understanding the impact of adversarial examples on their performance is an important step towards improving deepfake-image detectors. This study developed an anti-forensics case study of two popular general deepfake detectors based on their accuracy and generalization. Herein, we propose the Poisson noise DeepFool (PNDF), an improved iterative adversarial examples generation method. This method can simply and effectively attack forensics detectors by adding perturbations to images in different directions. Our attacks can reduce its AUC from 0.9999 to 0.0331, and the detection accuracy of deepfake images from 0.9997 to 0.0731. Compared with state-of-the-art studies, our work provides an important defense direction for future research on deepfake-image detectors, by focusing on the generalization performance of detectors and their resistance to adversarial example attacks.


2018 ◽  
Vol 10 (10) ◽  
pp. 3677 ◽  
Author(s):  
Andrzej Bak ◽  
Violetta Kozik ◽  
Paulina Dybal ◽  
Slawomir Kus ◽  
Aleksandra Swietlicka ◽  
...  

The sulfur-containing derivatives and their metabolites, regarded as ‘old devils of green’ chemistry, constitute a relevant class of air/water/soil contaminants in over-polluted world. In fact, some industrially-engineered solvents have become environmentally unfavorable. An attractive alternative to commonly used industrial liquids is sulfolane (C4H8SO2), an anthropogenic medium. The main objective of this paper is the comprehensive review focusing mainly on the state-of-the-art aspects of the sulfolane synthesis, application of sulfolane as an extractive solvent due to its ‘unique’ physicochemical properties as well as the potential of sulfolane to cause equipment corrosion and subsequent spills. The potential risk for groundwater contamination, danger for human health and ways of sulfolane biodegradation were briefly reviewed as well. Interestingly, the analysis performed on data stored in the Reaxys database revealed an alternating tendency of waxing and waning interest in sulfolane during the space of the last fifty years. Moreover, the primary goal of the presented case study was to verify applicability of industrial, multi-electrochemical technique for reliable detection of corrosion in low conductive process fluids. Several aspects of corrosion measurement including the impact of process parameters (temperature) and impurities (oxygen and chlorides) on stainless steel corrosion in pure sulfolane were investigated briefly.


Computers ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 16 ◽  
Author(s):  
Sona Ghahremani ◽  
Holger Giese

Evaluating the performance of self-adaptive systems is challenging due to their interactions with often highly dynamic environments. In the specific case of self-healing systems, the performance evaluations of self-healing approaches and their parameter tuning rely on the considered characteristics of failure occurrences and the resulting interactions with the self-healing actions. In this paper, we first study the state-of-the-art for evaluating the performances of self-healing systems by means of a systematic literature review. We provide a classification of different input types for such systems and analyse the limitations of each input type. A main finding is that the employed inputs are often not sophisticated regarding the considered characteristics for failure occurrences. To further study the impact of the identified limitations, we present experiments demonstrating that wrong assumptions regarding the characteristics of the failure occurrences can result in large performance prediction errors, disadvantageous design-time decisions concerning the selection of alternative self-healing approaches, and disadvantageous deployment-time decisions concerning parameter tuning. Furthermore, the experiments indicate that employing multiple alternative input characteristics can help with reducing the risk of premature disadvantageous design-time decisions.


Heliyon ◽  
2021 ◽  
Vol 7 (5) ◽  
pp. e07009
Author(s):  
Mehrdad Karimimoshaver ◽  
Mastooreh Parsamanesh ◽  
Farshid Aram ◽  
Amir Mosavi
Keyword(s):  

Author(s):  
M. Y. Shahin ◽  
James A. Crovetti ◽  
Kurt A. Keifer

Engineers for the city of Los Angeles have observed that lanes carrying Mass Transit Authority (MTA) bus traffic deteriorate at a faster rate than similar lanes without bus traffic. The increased rate of deterioration results in greater maintenance costs in these lanes. To properly apportion the increased maintenance costs, city engineers need an objective method for quantifying the impact of MTA bus traffic. Multiple evaluation techniques are presented that may be used to quantify the effect of buses in terms of increased deterioration rates and greater rehabilitation costs. State-of-the-art techniques that use the results of deflection testing and pavement condition surveys are presented. Data collection procedures, methods for condition and structural analyses, and life-cycle costing procedures are provided. A case study that uses data collected from the city is presented. This study indicates an average yearly additional maintenance cost of $800 per lane-mile caused by MTA bus traffic, excluding associated costs for curb and gutter or maintenance hole adjustments.


Border Gateway Protocol (BGP) is the protocol which helps to route the traffic over the internet, it also helps to interchange reachability and routing information between diverse Autonomous systems (AS). The major operations of Border gateway Protocol (BGP) takes place at transport layer. When BGP works with TCP it removes the need for acknowledgement, sequence number. The major problem which occurs over the network is due to delay during the process of path selection and due to change in routing table [2]. This degradation convergence and delay can occur due to defined policy in between the peers of network. BGP performance can be improved by implementing different techniques such as MD5 Authentication, 16 bits Autonomous system, 32 bits Autonomous system, Classless Inter Domain Routing (CIDR), IPSec over BGP and consistency assertions. In this paper we have used CIDR technique to enhance BGP performance as well as we have focused on identifying and calculating affects on convergence time of BGP protocol due to the variation in the number of nodes and complex topology design. We have designed simulation based topology over OpNet, to analyze the impact of convergence time of BGP. Simulation results show that we can minimize the convergence time due to link failure


2018 ◽  
Author(s):  
Ylber Limani ◽  
Edmond Hajrizi ◽  
Rina Sadriu

Sign in / Sign up

Export Citation Format

Share Document