메뉴 건너뛰기




Volumn , Issue , 2009, Pages 369-379

The Bayesian traffic analysis of mix networks

Author keywords

Anonymity; Markov chain Monte Carlo; Mix networks; Traffic analysis

Indexed keywords

BAYESIAN; BAYESIAN INFERENCE; MARKOV CHAIN MONTE CARLO; MIX NETWORKS; PROBABILISTIC MODELS; TRAFFIC ANALYSIS; TRAFFIC TRACES;

EID: 74049160327     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653707     Document Type: Conference Paper
Times cited : (32)

References (34)
  • 1
    • 3042699909 scopus 로고    scopus 로고
    • Measuring anonymity: The disclosure attack
    • Dakshi Agrawal and Dogan Kesdogan. Measuring anonymity: The disclosure attack. IEEE Security and Privacy, 1(6):27-34, 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.6 , pp. 27-34
    • Agrawal, D.1    Kesdogan, D.2
  • 2
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 4
    • 84904332394 scopus 로고    scopus 로고
    • Statistical disclosure attacks: Traffic confirmation in open environments
    • and, editors, Athens, May, IFIP TC11, Kluwer
    • George Danezis. Statistical disclosure attacks: Traffic confirmation in open environments. In Gritzalis, Vimercati, Samarati, and Katsikas, editors, Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421-426, Athens, May 2003. IFIP TC11, Kluwer.
    • (2003) Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003) , pp. 421-426
    • Danezis, G.1
  • 5
    • 74049089534 scopus 로고    scopus 로고
    • A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research, January
    • George Danezis and Claudia Diaz. A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research, January 2008.
    • (2008)
    • Danezis, G.1    Diaz, C.2
  • 9
    • 35048895319 scopus 로고    scopus 로고
    • Statistical disclosure or intersection attacks on anonymity systems
    • Proceedings of 6th Information Hiding Workshop IH 2004, Toronto, May
    • George Danezis and Andrei Serjantov. Statistical disclosure or intersection attacks on anonymity systems. In Proceedings of 6th Information Hiding Workshop (IH 2004), LNCS, Toronto, May 2004.
    • (2004) LNCS
    • Danezis, G.1    Serjantov, A.2
  • 11
    • 74049131872 scopus 로고    scopus 로고
    • The application of bayesian inference to traffic analysis
    • Technical report, Micorsoft Research, August
    • George Danezis and Carmela Troncoso. The application of bayesian inference to traffic analysis. Technical report, Micorsoft Research, August 2008.
    • (2008)
    • Danezis, G.1    Troncoso, C.2
  • 12
    • 38049141694 scopus 로고    scopus 로고
    • Measuring anonymity with relative entropy
    • Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust, of, Springer
    • Yuxin Deng, Jun Pang, and Peng Wu. Measuring anonymity with relative entropy. In Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust, volume 4691 of Lecture Notes in Computer Science, pages 65-79. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4691 , pp. 65-79
    • Deng, Y.1    Pang, J.2    Wu, P.3
  • 14
    • 35048831821 scopus 로고    scopus 로고
    • Reasoning about the anonymity provided by pool mixes that generate dummy traffic
    • Proceedings of 6th Information Hiding Workshop IH 2004, Toronto, May
    • Claudia Diaz and Bart Preneel. Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In Proceedings of 6th Information Hiding Workshop (IH 2004), LNCS, Toronto, May 2004.
    • (2004) LNCS
    • Diaz, C.1    Preneel, B.2
  • 15
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002, Springer-Verlag, April
    • Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
    • (2002) LNCS , vol.2482
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 19
    • 84885885532 scopus 로고    scopus 로고
    • Revisiting a combinatorial approach toward measuring anonymity
    • Marianne Winslett, editor, Alexandria,VA,USA, ACM
    • Benedikt Gierlichs, Carmela Troncoso, Claudia Diaz, Bart Preneel, and Ingrid Verbauwhede. Revisiting a combinatorial approach toward measuring anonymity. In Marianne Winslett, editor, Workshop on Privacy in the Electronic Society 2008, page 5, Alexandria,VA,USA, 2008. ACM.
    • (2008) Workshop on Privacy in the Electronic Society , pp. 5
    • Gierlichs, B.1    Troncoso, C.2    Diaz, C.3    Preneel, B.4    Verbauwhede, I.5
  • 20
    • 77956890234 scopus 로고
    • Monte carlo sampling methods using markov chains and their applications
    • April
    • W. K. Hastings. Monte carlo sampling methods using markov chains and their applications. Biometrika, 57(1):97-109, April 1970.
    • (1970) Biometrika , vol.57 , Issue.1 , pp. 97-109
    • Hastings, W.K.1
  • 22
    • 35248900308 scopus 로고    scopus 로고
    • Limits of anonymity in open environments
    • Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop IH 2002, Springer-Verlag, October
    • Dogan Kesdogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity in open environments. In Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578, October 2002.
    • (2002) LNCS , vol.2578
    • Kesdogan, D.1    Agrawal, D.2    Penz, S.3
  • 23
    • 35048865346 scopus 로고    scopus 로고
    • The hitting set attack on anonymity protocols
    • Proceedings of 6th Information Hiding Workshop IH 2004, Toronto, May
    • Dogan Kesdogan and Lexi Pimenidis. The hitting set attack on anonymity protocols. In Proceedings of 6th Information Hiding Workshop (IH 2004), LNCS, Toronto, May 2004.
    • (2004) LNCS
    • Kesdogan, D.1    Pimenidis, L.2
  • 25
    • 24344478834 scopus 로고    scopus 로고
    • Practical traffic analysis: Extending and resisting statistical disclosure
    • Proceedings of Privacy Enhancing Technologies workshop PET 2004, of, May
    • Nick Mathewson and Roger Dingledine. Practical traffic analysis: Extending and resisting statistical disclosure. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of LNCS, pages 17-34, May 2004.
    • (2004) LNCS , vol.3424 , pp. 17-34
    • Mathewson, N.1    Dingledine, R.2
  • 26
    • 38149130456 scopus 로고    scopus 로고
    • Sampled traffic analysis by internet-exchange-level adversaries
    • Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, of, Springer
    • Steven J. Murdoch and Piotr Zielinski. Sampled traffic analysis by internet-exchange-level adversaries. In Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, pages 167-183. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4776 , pp. 167-183
    • Murdoch, S.J.1    Zielinski, P.2
  • 29
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop PET 2002, Springer-Verlag, April
    • Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
    • (2002) LNCS , vol.2482
    • Serjantov, A.1    Danezis, G.2
  • 31
    • 84937565289 scopus 로고    scopus 로고
    • Towards an Analysis of Onion Routing Security
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
    • Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr. Towards an Analysis of Onion Routing Security. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96-114. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4
  • 33
    • 50249128196 scopus 로고    scopus 로고
    • Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, and Ingrid Verbauwhede. Perfect matching disclosure attacks. In Nikita Borisov and Ian Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), 5134 of Lecture Notes in Computer Science, pages 2-23, Leuven,BE, 2008. Springer-Verlag.
    • Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, and Ingrid Verbauwhede. Perfect matching disclosure attacks. In Nikita Borisov and Ian Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), volume 5134 of Lecture Notes in Computer Science, pages 2-23, Leuven,BE, 2008. Springer-Verlag.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.