메뉴 건너뛰기




Volumn 2, Issue 1-2, 2007, Pages 137-153

Analysis of flow-correlation attacks in anonymity network

Author keywords

anonymous communication; flow correlation attack; mix network

Indexed keywords


EID: 79551551587     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2007.012831     Document Type: Article
Times cited : (16)

References (36)
  • 2
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D. (1981) ‘Untraceable electronic mail, return addresses, and digital pseudonyms’, Communications of the ACM, Vol. 4, No. 2, pp.84–88.
    • (1981) Communications of the ACM , vol.4 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 3
    • 0023861309 scopus 로고
    • The dining cryptographers problem: unconditional sender and recipient untraceability
    • Chaum, D. (1988) ‘The dining cryptographers problem: unconditional sender and recipient untraceability’, Journal of Cryptology, Vol. 1, No. 1 pp.65–75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 7
    • 24344471201 scopus 로고    scopus 로고
    • FBI (2003) ‘Carnivore diagnostic tool’, Available at: http://www.fbi.gov/hq/lab/camivore/carnivore2.htm.
    • (2003) Carnivore diagnostic tool
    • FBI1
  • 13
    • 84899012896 scopus 로고    scopus 로고
    • Distribution of mutual information
    • T.G. Dietterich, S. Becker, and Z. Ghahramani, (Eds) Cambridge, MA: MIT Press
    • Hutter, M. (2002) ‘Distribution of mutual information’, in T.G. Dietterich, S. Becker, and Z. Ghahramani, (Eds). Advances in Neural Information Processing Systems 14, Cambridge, MA: MIT Press, pp.399–406.
    • (2002) Advances in Neural Information Processing Systems 14 , pp. 399-406
    • Hutter, M.1
  • 14
    • 23844515436 scopus 로고    scopus 로고
    • Random-data perturbation techniques and privacy-preserving data mining
    • Kargupta, H., Datta, S., Wang, Q. and Sivakumar, K. (2005) ‘Random-data perturbation techniques and privacy-preserving data mining’, Knowledge Infosys System, Vol. 7, No. 4, pp.387–414.
    • (2005) Knowledge Infosys System , vol.7 , Issue.4 , pp. 387-414
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 15
    • 84890010554 scopus 로고    scopus 로고
    • Stop- and-Go MlXes: providing probabilistic anonymity in an open system
    • Springer-Verlag, LNCS 1525
    • Kesdogan, D., Egner, J. and Büschkes, R. (1998) ‘Stop- and-Go MlXes: providing probabilistic anonymity in an open system’, Proceedings of Information Hiding Workshop (IH 1998), Springer-Verlag, LNCS 1525, pp.83–98.
    • (1998) Proceedings of Information Hiding Workshop (IH 1998) , pp. 83-98
    • Kesdogan, D.1    Egner, J.2    Büschkes, R.3
  • 20
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of poisson modeling
    • Paxson, V. and Floyd, S. (1995) ‘Wide-area traffic: The failure of poisson modeling’, IEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp.226–244.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 22
    • 35248841429 scopus 로고    scopus 로고
    • Fromatrickle to a flood: active attacks on several mix types
    • F. Petitcolas, (Eds) Springer-Verlag, LNCS 2578
    • Serjantov, A., Dingledine, R. and Syverson, P. (2002) ‘Fromatrickle to a flood: active attacks on several mix types’, in F. Petitcolas, (Eds). Proceedings of Information Hiding Workshop (IH2002), Springer-Verlag, LNCS 2578, pp.36–52.
    • (2002) Proceedings of Information Hiding Workshop (IH2002) , pp. 36-52
    • Serjantov, A.1    Dingledine, R.2    Syverson, P.3
  • 29
    • 84952959881 scopus 로고    scopus 로고
    • Although Crowds may not use the classical Chaum’s mix, for simplicity, we still use the name of ‘mix’ to refer to a single anonymity network hop, and our theory can be applied to all the rerouting-based anonymity networks
    • Although Crowds may not use the classical Chaum’s mix, for simplicity, we still use the name of ‘mix’ to refer to a single anonymity network hop, and our theory can be applied to all the rerouting-based anonymity networks.
  • 30
    • 84952953882 scopus 로고    scopus 로고
    • We use an operational definition for ‘low-latency’. We call a communication system low-latency in this context when it does not unduly disrupt TCP connections under normal load conditions. Using this definition, TOR is clearly low-latency
    • We use an operational definition for ‘low-latency’. We call a communication system low-latency in this context when it does not unduly disrupt TCP connections under normal load conditions. Using this definition, TOR is clearly low-latency.
  • 31
    • 84952960602 scopus 로고    scopus 로고
    • Such a flow can be either a TCP connection or a segment of UDP packets that are part of a VOIP connection, or any other sequence of packets that represent a communication session. In the experiments described later, we are using the traffic from a FTP session as the flow
    • Such a flow can be either a TCP connection or a segment of UDP packets that are part of a VOIP connection, or any other sequence of packets that represent a communication session. In the experiments described later, we are using the traffic from a FTP session as the flow.
  • 32
    • 84952968258 scopus 로고    scopus 로고
    • We tacitly assume that incoming flows are unrelated and thus statistically independent from each other
    • We tacitly assume that incoming flows are unrelated and thus statistically independent from each other.
  • 33
    • 84952960427 scopus 로고    scopus 로고
    • In the following we will need to distinguish the frequency of an event as sampled from the collected data from the underlying distribution of the same event. We use the notation p for the frequency and p for the underlying distribution. Similarly, we use I to denote the estimated mutual information based on the sampled time series f and l. We denote the actual mutual information based on the underlying distributions as I
    • In the following we will need to distinguish the frequency of an event as sampled from the collected data from the underlying distribution of the same event. We use the notation p for the frequency and p for the underlying distribution. Similarly, we use I to denote the estimated mutual information based on the sampled time series f and l. We denote the actual mutual information based on the underlying distributions as I.
  • 34
    • 84952955416 scopus 로고    scopus 로고
    • The reason for the expansion at the points of the underlying distribution is that the original mutual information is based on the underlying distribution
    • The reason for the expansion at the points of the underlying distribution is that the original mutual information is based on the underlying distribution.
  • 35
    • 84952963052 scopus 로고    scopus 로고
    • In the simplified case where there are only two possible outcomes of (a, b), the distribution will be binomial distribution. For the case where there are more than two outcomes, the distribution will be multinomial
    • In the simplified case where there are only two possible outcomes of (a, b), the distribution will be binomial distribution. For the case where there are more than two outcomes, the distribution will be multinomial.
  • 36
    • 85086683316 scopus 로고    scopus 로고
    • f,lM→R1 (a, b). The subscript is removed for the sake of brevity
    • f,lM→R1 (a, b). The subscript is removed for the sake of brevity.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.