Decoy Routing: Internet Freedom in the Networkâ€™s Core
funded by a subcontract from the University of Michigan (U.S. Department of State prime)
researchers: Nikita Borisov and Matthew Caesar
As a component of a larger research effort, this project is working to design and implement a Cirripede-style decoy router that is adapted to incorporate mechanisms from other decoy routing designs, and to evaluate the performance, reliability, and security of this router in a realistic ISP testbed. The team is also investigating traffic fingerprinting techniques that could be used by censors to distinguish decoy routing traffic and the design of defenses against such fingerprinting. Models are being developed that will inform the placement of decoy routers in a network, and tools are being created that can use new network routing information to update such models. Finally, in collaboration with other engineering teams, the Illinois team is also contributing to the development of a decoy routing testbed, the design of a common client framework for decoy routing, and the creation of decoy discovery mechanisms.