On the Effectiveness of Continuous-Time Mixes under Flow Correlation Attacks
نویسندگان
چکیده
ABSTRACT To achieve anonymity in open environments such as the Internet, special proxies, denoted as mixes, were proposed to relay messages for senders and receivers. A mix may delay, batch and reorder packets to disrupt the packet-level timing correlation of packets into and out of the mix. Often multiple mixes are grouped into a mix network, which preserves anonymity in presence of compromised mixes. In a flow-based mix network, so-called flow correlation attacks have been proposed earlier to explore flow-level correlation and have been shown empirically to seriously degrade mix-based anonymous communication systems. In this paper, we theoretically analyze the effectiveness of a mix network under flow correlation attacks. Our formulae clearly show how a mix network will ultimately fail when an adversary has access to sufficiently long flow samples, independently of the type of flows (TCP or UDP). We illustrate the analysis methodology by modeling a continuous-time mix, which randomly delays each incoming packet. Our queuingmodel-based analysis captures the essence of flow correlation attacks and can provide useful guidelines for designers who develop and deploy anonymity systems.
منابع مشابه
Anomaly Protection Using Batching Strategies
Traffic analysis is typically countered by the use of intermediary nodes, whose role is to perturb the traffic flow and thus confuse an external observer. Such intermediaries are called mixes. We address attacks that exploit the timing behaviour of TCP and other protocols and applications in low-latency anonymity networks. Intermediaries delay and reroute exchanged messages, reorder them, pad t...
متن کاملOn Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures that can defeat various traffic analysis attacks. In this paper, we focus on a particular class of traffic analysis attack, flow correlation attacks, by which an advers...
متن کاملApplication of SCB Test and Surface Free Energy Method in Evaluating Crack Resistance of SBS Modified Asphalt Mixes
Cohesion properties of the binder matrix within asphalt mixes and adhesion characteristics of the asphalt binder and aggregate particles are the two major mechanisms resisting against cracking in asphalt mixes. This study is focused on estimating crack resistance of asphalt mixes at intermediate temperatures through evaluation of cohesion and adhesion properties of binder-aggregate systems usin...
متن کاملAnalysis of flow-correlation attacks in anonymity network
Mix networks are designed to provide anonymity for users in a variety of applications, including privacy-preserving WWW browsing and numerous e-commerce systems. Such networks have been shown to be susceptible to a number of statistical traffic analysis attacks. Among these are flow correlation attacks, where an adversary may disclose the communication relationship between a sender and a receiv...
متن کاملFatigue Behavior Analysis of Asphalt Mixes Containing Electric Arc Furnace (EAF) Steel Slag
This research was conducted in order to evaluate fatigue behavior of asphalt mixes containing Electric Arc Furnace (EAF) steel slag. After initial evaluation of the properties of EAF steel slag using X-ray Diffraction (XRD) and Scanning Electric Microscope (SEM), six sets of laboratory mixtures were prepared. Each set were treated replacing various portions of limestone aggregates of the mix wi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005