Probabilistic Treatment of MIXes to Hamper Traffic Analysis
نویسندگان
چکیده
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated with whom, for how long, and from which location, by hiding traffic information. This is accomplished by organizing additional traffic to conceal particular communication relationships and by embedding the sender and receiver of a message in their respective anonymity sets. If the number of overall participants is greater than the size of the anonymity set and if the anonymity set changes with time due to unsynchronized participants, then the anonymity technique becomes prone to traffic analysis attacks. In this paper, we are interested in the statistical properties of the disclosure attack, a newly suggested traffic analysis attack on the MIXes. Our goal is to provide analytical estimates of the number of observations required by the disclosure attack and to identify fundamental (but avoidable) ‘weak operational modes’ of the MIXes and thus to protect users against a traffic analysis by the disclosure attack.
منابع مشابه
Optimizing the design parameters of threshold pool mixes for anonymity and delay
The provision of content confidentiality via message encryption is by no means sufficient when facing the significant privacy risks present in online communications. Indeed, the privacy literature abounds with examples of traffic analysis techniques aimed to reveal a great deal of information, merely from the knowledge, even if probabilistic, of who is communicating with whom, when, and how fre...
متن کاملThe Traffic Analysis of Continuous-Time Mixes
We apply the information-theoretic anonymity metrics to continuous-time mixes, that individually delay messages instead of batching them. The anonymity of such mixes is measured based on their delay characteristics, and as an example the exponential mix (sg-mix) is analysed, simulated and shown to use the optimal strategy. We also describe a practical and powerful traffic analysis attack agains...
متن کاملTaxonomy of Mixes and Dummy Traffic
This paper presents an analysis of mixes and dummy traffic policies, which are building blocks of anonymous services. The goal of the paper is to bring together all the issues related to the analysis and design of mix networks. We discuss continuous and pool mixes, topologies for mix networks and dummy traffic policies. We point out the advantages and disadvantages of design decisions for mixes...
متن کاملFatigue Behavior Analysis of Asphalt Mixes Containing Electric Arc Furnace (EAF) Steel Slag
This research was conducted in order to evaluate fatigue behavior of asphalt mixes containing Electric Arc Furnace (EAF) steel slag. After initial evaluation of the properties of EAF steel slag using X-ray Diffraction (XRD) and Scanning Electric Microscope (SEM), six sets of laboratory mixtures were prepared. Each set were treated replacing various portions of limestone aggregates of the mix wi...
متن کاملApplication of SCB Test and Surface Free Energy Method in Evaluating Crack Resistance of SBS Modified Asphalt Mixes
Cohesion properties of the binder matrix within asphalt mixes and adhesion characteristics of the asphalt binder and aggregate particles are the two major mechanisms resisting against cracking in asphalt mixes. This study is focused on estimating crack resistance of asphalt mixes at intermediate temperatures through evaluation of cohesion and adhesion properties of binder-aggregate systems usin...
متن کامل