ATTACK AGAINST ANONYMITY USING CELL COUNTING

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Novel Approach To Cell-Counting-Based Attack Against Tor

Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of the secrecy systems pack the application data into equal-sized cells. Through extensive experiments on Tor, we originate that the size of IP packets in the Tor network can be very ac...

متن کامل

An Enhanced K-Anonymity Model against Homogeneity Attack

k-anonymity is an important model in the field of privacy protection and it is an effective method to prevent privacy disclosure in micro-data release. However, it is ineffective for the attribute disclosure by the homogeneity attack. The existing models based on k-anonymity have solved this problem to a certain extent, but they did not distinguish the different values of the sensitive attribut...

متن کامل

Measuring Anonymity: The Disclosure Attack

ing Mixes Because an adversary can easily determine anonymity sets at the network level, Mixes assume that all network links are observable. Thus, by observing messages to and from an anonymity service, an attacker can determine anonymity sets. Rather than discuss the technical details of any anonymity technique here, we abstract them using the following properties2: • In each anonymous communi...

متن کامل

Using Linkability Information to Attack Mix-Based Anonymity Services

There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work done that use linkability information, that is information about the probability that two messages have been sent by the same sender. In this paper we model information about linkability between messages as a weighted...

متن کامل

Slotted Packet Counting Attacks on Anonymity Protocols

In this paper we present a slotted packet counting attack against anonymity protocols. Common packet counting attacks make strong assumptions on the setup and can easily lead to wrong conclusions, as we will show in our work. To overcome these limitations, we account for the variation of tra c load over time. We use correlation to express the relation between sender and receiver nodes. Our atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Communication Networks and Security

سال: 2013

ISSN: 2231-1882

DOI: 10.47893/ijcns.2013.1069