메뉴 건너뛰기




Volumn , Issue , 2008, Pages 267-278

Information leaks in structured peer-to-peer anonymous communication systems

Author keywords

Anonymity; Attacks; Information leaks; Peer to peer

Indexed keywords

ACTIVE ATTACK; ANONYMITY; ANONYMOUS COMMUNICATION; ANONYMOUS COMMUNICATION SYSTEMS; ATTACKS; INFORMATION-LEAKS; LOOKUPS; NEW APPROACHES; PASSIVE AND ACTIVE ATTACKS; PASSIVE ATTACKS; PEER-TO-PEER; SECURITY PARAMETERS; STRUCTURED PEER-TO-PEER;

EID: 70349273917     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455805     Document Type: Conference Paper
Times cited : (34)

References (52)
  • 1
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • I. S. Moskowitz, editor, Information Hiding Workshop, of, Springer-Verlag, Apr
    • A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Information Hiding Workshop, volume 2137 of Lecture Notes in Computer Science, pages 245-247. Springer-Verlag, Apr. 2001.
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 245-247
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 3
    • 70349291847 scopus 로고    scopus 로고
    • S. M. Bellovin and D. A. Wagner, editors, May
    • S. M. Bellovin and D. A. Wagner, editors. IEEE Symposium on Security and Privacy, May 2003.
    • (2003) IEEE Symposium on Security and Privacy
  • 4
    • 84963503600 scopus 로고    scopus 로고
    • O. Berthold, H. Federrath, and M. Köhntopp. Project anonymity and unobservability in the Internet. In L. Cranor, editor, Tenth conference on Computers, Freedom and Privacy, pages 57-65, New York, NY. USA, 2000. ACM.
    • O. Berthold, H. Federrath, and M. Köhntopp. Project "anonymity and unobservability in the Internet". In L. Cranor, editor, Tenth conference on Computers, Freedom and Privacy, pages 57-65, New York, NY. USA, 2000. ACM.
  • 6
    • 70349281177 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Wright and Syverson [52], pages 92-102.
    • Wright and Syverson , vol.52 , pp. 92-102
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 8
    • 70349299597 scopus 로고    scopus 로고
    • Improving sender anonymity in a structured overlay with imprecise routing
    • G. Ciaccio. Improving sender anonymity in a structured overlay with imprecise routing. In Danezis and Golle [13], pages 190-207.
    • Danezis and Golle , vol.13 , pp. 190-207
    • Ciaccio, G.1
  • 9
    • 84958740468 scopus 로고    scopus 로고
    • Mobius: An extensible tool for performance and dependability modeling
    • B. R. Haverkort, H. C. Bohnenkamp, and C. U. Smith, editors, Schaumburg, IL, Mar, Springer
    • D. Daly, D. D. Deavours, J. M. Doyle, P. G. Webster, and W. H. Sanders. Mobius: An extensible tool for performance and dependability modeling. In B. R. Haverkort, H. C. Bohnenkamp, and C. U. Smith, editors, Computer Performance Evaluation: Modelling Techniques and Tools, volume 1786, pages 332-336, Schaumburg, IL, Mar. 2000. Springer.
    • (2000) Computer Performance Evaluation: Modelling Techniques and Tools , vol.1786 , pp. 332-336
    • Daly, D.1    Deavours, D.D.2    Doyle, J.M.3    Webster, P.G.4    Sanders, W.H.5
  • 10
    • 84904332394 scopus 로고    scopus 로고
    • Statistical disclosure attacks: Traffic confirmation in open environments
    • and, editors, Athens, May, IFIP TC11, Kluwer
    • G. Danezis. Statistical disclosure attacks: Traffic confirmation in open environments. In Gritzalis, Vimercati, Samarati, and Katsikas, editors, Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421-426, Athens, May 2003. IFIP TC11, Kluwer.
    • (2003) Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003) , pp. 421-426
    • Danezis, G.1
  • 11
    • 70349301122 scopus 로고    scopus 로고
    • Route fingerprinting in anonymous communications
    • IEEE Computer Society, Sept
    • G. Danezis and R. Clayton. Route fingerprinting in anonymous communications. In IEEE Conference on Peer-to-Peer Computing, pages 69-72. IEEE Computer Society, Sept. 2006.
    • (2006) IEEE Conference on Peer-to-Peer Computing , pp. 69-72
    • Danezis, G.1    Clayton, R.2
  • 12
    • 0037810717 scopus 로고    scopus 로고
    • Mixminion: Design of a Type III anonymous remailer protocol
    • G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a Type III anonymous remailer protocol. In Bellovin and Wagner [3], pages 2-15.
    • Bellovin and Wagner , vol.3 , pp. 2-15
    • Danezis, G.1    Dingledine, R.2    Mathewson, N.3
  • 13
    • 70349291848 scopus 로고    scopus 로고
    • Sixth Workshop on Privacy Enhancing Technologies
    • G. Danezis and P. Golle, editors, of, Cambridge, UK, June, Springer
    • G. Danezis and P. Golle, editors. Sixth Workshop on Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, Cambridge, UK, June 2006. Springer.
    • (2006) Lecture Notes in Computer Science , vol.4258
  • 14
    • 50249147866 scopus 로고    scopus 로고
    • Bridging and fingerprinting: Epistemic attacks on route selection
    • N. Borisov and I. Goldberg, editors, Privacy Enhancing Technologies Symposium, of, Springer, July
    • G. Danezis and P. Syverson. Bridging and fingerprinting: Epistemic attacks on route selection. In N. Borisov and I. Goldberg, editors, Privacy Enhancing Technologies Symposium, volume 5134 of Lecture Notes in Computer Science, pages 151-166. Springer, July 2007.
    • (2007) Lecture Notes in Computer Science , vol.5134 , pp. 151-166
    • Danezis, G.1    Syverson, P.2
  • 16
    • 85084161366 scopus 로고    scopus 로고
    • Tor: The second-generation onion router
    • M. Blaze, editor, USENIX Association, Aug
    • R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In M. Blaze, editor, USENIX Security Symposium, pages 303-320. USENIX Association, Aug. 2004.
    • (2004) USENIX Security Symposium , pp. 303-320
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.3
  • 17
    • 24944524538 scopus 로고    scopus 로고
    • Privacy Enhancing Technologies Workshop
    • R. Dingledine and P. Syverson, editors, of, Springer, April
    • R. Dingledine and P. Syverson, editors. Privacy Enhancing Technologies Workshop, volume 2482 of Lecture Notes in Computer Science. Springer, April 2002.
    • (2002) Lecture Notes in Computer Science , vol.2482
  • 18
    • 24944498611 scopus 로고    scopus 로고
    • Druschel et al, 19
    • J. Douceur. The Sybil Attack. In Druschel et al. [19], pages 251-260.
    • The Sybil Attack , pp. 251-260
    • Douceur, J.1
  • 19
    • 70349298074 scopus 로고    scopus 로고
    • International Workshop on Peer-to-Peer Systems (IPTPS)
    • P. Druschel, F. Kaashoek, and A. Rowstron, editors, of, Springer, Mar
    • P. Druschel, F. Kaashoek, and A. Rowstron, editors. International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer-Science. Springer, Mar. 2002.
    • (2002) Lecture Notes in Computer-Science , vol.2429
  • 20
    • 84937611260 scopus 로고    scopus 로고
    • International Workshop on Design Issues in Anonymity and Unobservability
    • H. Federrath, editor, of, Springer, July
    • H. Federrath, editor. International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science. Springer, July 2000.
    • (2000) Lecture Notes in Computer Science , vol.2009
  • 21
    • 0038349207 scopus 로고    scopus 로고
    • Tarzan: A peer-to-peer anonymizing network layer
    • R. Sandhu, editor, New York, NY, USA, ACM
    • M. J, Freedman and R, Morris. Tarzan: A peer-to-peer anonymizing network layer. In R. Sandhu, editor, ACM Conference on Computer and Communications Security, pages 193-206, New York, NY, USA, 2002. ACM.
    • (2002) ACM Conference on Computer and Communications Security , pp. 193-206
    • Freedman, M.J.1    Morris, R.2
  • 22
    • 70349298073 scopus 로고    scopus 로고
    • Tor at heart of embassy passwords leak
    • September 10
    • D. Goodin. Tor at heart of embassy passwords leak. The Register, September 10 2007.
    • (2007) The Register
    • Goodin, D.1
  • 24
    • 35248866616 scopus 로고    scopus 로고
    • Koorde: A simple degree-optimal distributed hash table
    • F. Kaashoek and I. Stoica, editors. International Workshop on Peer-to-Peer Systems IPTPS, of, Springer, Feb
    • M. F. Kaashoek and D, R. Karger. Koorde: A simple degree-optimal distributed hash table. In F. Kaashoek and I. Stoica, editors. International Workshop on Peer-to-Peer Systems (IPTPS), volume 2735 of Lecture Notes in Computer Science, pages 98-107. Springer, Feb. 2003.
    • (2003) Lecture Notes in Computer Science , vol.2735 , pp. 98-107
    • Kaashoek, M.F.1    Karger, D.R.2
  • 25
    • 70349265715 scopus 로고    scopus 로고
    • A. Kapadia and N. Triandopoulos. Halo: High-assurance locate for distributed hash tables. In C. Cowan and G. Vigna, editors. Network and Distributed System Security Symposium, pages 61-79, Feb. 2008.
    • A. Kapadia and N. Triandopoulos. Halo: High-assurance locate for distributed hash tables. In C. Cowan and G. Vigna, editors. Network and Distributed System Security Symposium, pages 61-79, Feb. 2008.
  • 26
    • 35248900308 scopus 로고    scopus 로고
    • Limits of anonymity in open environments
    • F. A. Petitcolas, editor. Information Hiding Workshop, of, Springer-Verlag, October
    • D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In F. A. Petitcolas, editor. Information Hiding Workshop, volume 2578 of Lecture Notes in Computer Science, pages 53-69. Springer-Verlag, October 2002.
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 53-69
    • Kesdogan, D.1    Agrawal, D.2    Penz, S.3
  • 27
    • 24344478834 scopus 로고    scopus 로고
    • Practical traffic analysis: Extending and resisting statistical disclosure
    • D. Martin and A. Serjantov, editors, Workshop on Privacy Enhancing Technologies, of, Springer, May
    • N. Mathewson and R. Dingledine. Practical traffic analysis: Extending and resisting statistical disclosure. In D. Martin and A. Serjantov, editors, Workshop on Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, pages 17-24. Springer, May 2004.
    • (2004) Lecture Notes in Computer Science , vol.3424 , pp. 17-24
    • Mathewson, N.1    Dingledine, R.2
  • 29
    • 70349290301 scopus 로고    scopus 로고
    • U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol-Version 2. IETF Internet Draft, July 2003
    • U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol-Version 2. IETF Internet Draft, July 2003.
  • 30
    • 34547339276 scopus 로고    scopus 로고
    • Hot or not: Revealing hidden services by their clock skew
    • S. J. Murdoch. Hot or not: Revealing hidden services by their clock skew. In Wright and di Vimercati [51], pages 27-36.
    • Wright and di Vimercati , vol.51 , pp. 27-36
    • Murdoch, S.J.1
  • 31
    • 27544454707 scopus 로고    scopus 로고
    • S. J. Murdoch and G. Danezis. Low-cost traffic analysis of Tor. In V. Paxson and M. Waidner, editors, IEEE Symposium on Security and Privacy, pages 183-195, May 2005.
    • S. J. Murdoch and G. Danezis. Low-cost traffic analysis of Tor. In V. Paxson and M. Waidner, editors, IEEE Symposium on Security and Privacy, pages 183-195, May 2005.
  • 32
    • 38149130456 scopus 로고    scopus 로고
    • Sampled traffic analysis by Internet-exchange-level adversaries
    • N. Borisov and P. Golle, editors, Privacy Enhancing Technologies Symposium, of, Springer, June
    • S. J. Murdoch and P. Zielinski. Sampled traffic analysis by Internet-exchange-level adversaries. In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies Symposium, volume 4776 of Lecture Notes in Computer Science, pages 167-183. Springer, June 2007.
    • (2007) Lecture Notes in Computer Science , vol.4776 , pp. 167-183
    • Murdoch, S.J.1    Zielinski, P.2
  • 33
    • 70349276454 scopus 로고    scopus 로고
    • A. Nambiar and M. Wright. The Salsa simulator. http: //ranger.uta.edu/ ̃mwright/code/salsa-sims.zip.
    • A. Nambiar and M. Wright. The Salsa simulator. http: //ranger.uta.edu/ ̃mwright/code/salsa-sims.zip.
  • 34
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • A. Nambiar and M. Wright. Salsa: a structured approach to large-scale anonymity. In Wright and di Vimercati [51], pages 17-26.
    • Wright and di Vimercati , vol.51 , pp. 17-26
    • Nambiar, A.1    Wright, M.2
  • 35
    • 70349281176 scopus 로고    scopus 로고
    • P. Palfrader. Number of running Tor routers
    • P. Palfrader. Number of running Tor routers.
  • 36
    • 65549153230 scopus 로고    scopus 로고
    • News briefs
    • April
    • L. D. Paulson. News briefs. IEEE Computer, 39(4): 17-19, April 2006.
    • (2006) IEEE Computer , vol.39 , Issue.4 , pp. 17-19
    • Paulson, L.D.1
  • 37
    • 0038311863 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues, and open problems
    • J.-F. Raymond. Traffic analysis: Protocols, attacks, design issues, and open problems. In Federrath [20], pages 10-29.
    • In Federrath , vol.20 , pp. 10-29
    • Raymond, J.-F.1
  • 39
    • 0038041177 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection
    • Washington, DC, USA, November
    • M. Rennhard and B. Plattner. Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection. In Workshop on Privacy in Electronic Society, pages 91-102, Washington, DC, USA, November 2002.
    • (2002) Workshop on Privacy in Electronic Society , pp. 91-102
    • Rennhard, M.1    Plattner, B.2
  • 40
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
    • G. Goos, J. Hartmanis, and J. van Leeuwen, editors, IFIP/ACM International Conference on Distributed Systems Platforms Middleware, of, Springer. Nov
    • A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In G. Goos, J. Hartmanis, and J. van Leeuwen, editors, IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), volume 2218 of Lecture Notes in Computer Science, pages 329-350. Springer. Nov. 2001.
    • (2001) Lecture Notes in Computer Science , vol.2218 , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 41
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Dingledine and Syverson [17].
    • Dingledine and Syverson , vol.17
    • Serjantov, A.1    Danezis, G.2
  • 42
    • 85091906531 scopus 로고    scopus 로고
    • Towards application-aware anonymous routing
    • T. Jaeger, editor, USENIX Association, Aug
    • M. Sherr, B. T. Loo, and M. Blaze. Towards application-aware anonymous routing. In T. Jaeger, editor, Workshop on Hot Topics in Security. USENIX Association, Aug. 2007.
    • (2007) Workshop on Hot Topics in Security
    • Sherr, M.1    Loo, B.T.2    Blaze, M.3
  • 46
    • 70349296537 scopus 로고    scopus 로고
    • Breaking the collusion detection mechanism of MorphMix
    • P. Tabriz and N. Borisov. Breaking the collusion detection mechanism of MorphMix. In Danezis and Golle [13], pages 368-383.
    • Danezis and Golle , vol.13 , pp. 368-383
    • Tabriz, P.1    Borisov, N.2
  • 47
    • 3242703749 scopus 로고    scopus 로고
    • A survey of peer-to-peer security issues
    • M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, International Symposium on Software Security, of, Springer
    • D. Wallach. A survey of peer-to-peer security issues. In M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, International Symposium on Software Security, volume 2609 of Lecture Notes in Computer Science, pages 253-258. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2609 , pp. 253-258
    • Wallach, D.1
  • 48
    • 70349301121 scopus 로고    scopus 로고
    • M. Wright, M. Adler, B. N. Levine, and C. Shields. An analysis of the degradation of anonymous protocols. In P. van oorschot and V. Gligor, editors, Network and Distributed System Security Symposium, pages 39-50. Feb. 2002.
    • M. Wright, M. Adler, B. N. Levine, and C. Shields. An analysis of the degradation of anonymous protocols. In P. van oorschot and V. Gligor, editors, Network and Distributed System Security Symposium, pages 39-50. Feb. 2002.
  • 49
    • 0038148416 scopus 로고    scopus 로고
    • Defending anonymous communication against passive logging attacks
    • M. Wright, M. Adler, B. N. Levine, and C. Shields. Defending anonymous communication against passive logging attacks. In Bellovin and Wagner [3], pages 28-41.
    • Bellovin and Wagner , vol.3 , pp. 28-41
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.