Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution

09/12/2017
by   Milad Nasr, et al.
0

A core technique used by popular proxy-based circumvention systems like Tor, Psiphon, and Lantern is to secretly share the IP addresses of circumvention proxies with the censored clients for them to be able to use such systems. For instance, such secretly shared proxies are known as bridges in Tor. However, a key challenge to this mechanism is the insider attack problem: censoring agents can impersonate as benign censored clients in order to obtain (and then block) such secretly shared circumvention proxies. In this paper, we perform a fundamental study on the problem of insider attack on proxy-based circumvention systems. We model the proxy distribution problem using game theory, based on which we derive the optimal strategies of the parties involved, i.e., the censors and circumvention system operators. That is, we derive the optimal proxy distribution mechanism of a circumvention system like Tor, against the censorship adversary who also takes his optimal censorship strategies. This is unlike previous works that design ad hoc mechanisms for proxy distribution, against non-optimal censors. We perform extensive simulations to evaluate our optimal proxy assignment algorithm under various adversarial and network settings. Comparing with the state-of-the-art prior work, we show that our optimal proxy assignment algorithm has superior performance, i.e., better resistance to censorship even against the strongest censorship adversary who takes her optimal actions. We conclude with lessons and recommendation for the design of proxy-based circumvention systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/11/2022

What is Proxy Discrimination?

The near universal condemnation of proxy discrimination hides a disagree...
research
06/03/2015

A Game-Theoretic Model and Best-Response Learning Method for Ad Hoc Coordination in Multiagent Systems

The ad hoc coordination problem is to design an autonomous agent which i...
research
06/05/2023

Random Distribution Shift in Refugee Placement: Strategies for Building Robust Models

Algorithmic assignment of refugees and asylum seekers to locations withi...
research
05/08/2023

Optimal Scheduling of Agents in ADTrees: Specialised Algorithm and Declarative Models

Expressing attack-defence trees in a multi-agent setting allows for stud...
research
06/25/2019

Proxy Certificates: The Missing Link in the Web's Chain of Trust

The ability to quickly revoke a compromised key is critical to the secur...
research
06/14/2023

A Proxy-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks

Poisoning efficiency is a crucial factor in poisoning-based backdoor att...
research
01/30/2023

The Optimal Choice of Hypothesis Is the Weakest, Not the Shortest

If A and B are sets such that A ⊂ B, generalisation may be understood as...

Please sign up or login with your details

Forgot password? Click here to reset