Probabilistic Treatment of MIXes to Hamper Traffic Analysis

نویسندگان

  • Dakshi Agrawal
  • Dogan Kesdogan
  • Stefan Penz
چکیده

The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated with whom, for how long, and from which location, by hiding traffic information. This is accomplished by organizing additional traffic to conceal particular communication relationships and by embedding the sender and receiver of a message in their respective anonymity sets. If the number of overall participants is greater than the size of the anonymity set and if the anonymity set changes with time due to unsynchronized participants, then the anonymity technique becomes prone to traffic analysis attacks. In this paper, we are interested in the statistical properties of the disclosure attack, a newly suggested traffic analysis attack on the MIXes. Our goal is to provide analytical estimates of the number of observations required by the disclosure attack and to identify fundamental (but avoidable) ‘weak operational modes’ of the MIXes and thus to protect users against a traffic analysis by the disclosure attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing the design parameters of threshold pool mixes for anonymity and delay

The provision of content confidentiality via message encryption is by no means sufficient when facing the significant privacy risks present in online communications. Indeed, the privacy literature abounds with examples of traffic analysis techniques aimed to reveal a great deal of information, merely from the knowledge, even if probabilistic, of who is communicating with whom, when, and how fre...

متن کامل

The Traffic Analysis of Continuous-Time Mixes

We apply the information-theoretic anonymity metrics to continuous-time mixes, that individually delay messages instead of batching them. The anonymity of such mixes is measured based on their delay characteristics, and as an example the exponential mix (sg-mix) is analysed, simulated and shown to use the optimal strategy. We also describe a practical and powerful traffic analysis attack agains...

متن کامل

Taxonomy of Mixes and Dummy Traffic

This paper presents an analysis of mixes and dummy traffic policies, which are building blocks of anonymous services. The goal of the paper is to bring together all the issues related to the analysis and design of mix networks. We discuss continuous and pool mixes, topologies for mix networks and dummy traffic policies. We point out the advantages and disadvantages of design decisions for mixes...

متن کامل

Fatigue Behavior Analysis of Asphalt Mixes Containing Electric Arc Furnace (EAF) Steel Slag

This research was conducted in order to evaluate fatigue behavior of asphalt mixes containing Electric Arc Furnace (EAF) steel slag. After initial evaluation of the properties of EAF steel slag using X-ray Diffraction (XRD) and Scanning Electric Microscope (SEM), six sets of laboratory mixtures were prepared. Each set were treated replacing various portions of limestone aggregates of the mix wi...

متن کامل

Application of SCB Test and Surface Free Energy Method in Evaluating Crack Resistance of SBS Modified Asphalt Mixes

Cohesion properties of the binder matrix within asphalt mixes and adhesion characteristics of the asphalt binder and aggregate particles are the two major mechanisms resisting against cracking in asphalt mixes. This study is focused on estimating crack resistance of asphalt mixes at intermediate temperatures through evaluation of cohesion and adhesion properties of binder-aggregate systems usin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003