Decoy Routing on Asymmetric Routes Via Error Messages
Speaker: Victoria ManfredDecoy routing is a powerful circumvention mechanism intended to provide secure communications that cannot be monitored, detected, or disrupted by a third party who controls the user’s network infrastructure. Current decoy routing protocols have weaknesses, however: they either make the unrealistic assumption that routes through the network are symmetric or they modify the route taken by packets in connections that use the protocol, and these route changes are detectable by a third party. In this talk, I will describe Rebound, a decoy routing protocol that tolerates asymmetric routes without modifying the route taken by any packet that passes through the decoy router, making it more difficult to detect or disrupt than previous decoy routing protocols. I will end this talk by describing some of my current research interests in network privacy.