Unmixing Mix Traffic

نویسندگان

  • Ye Zhu
  • Riccardo Bettati
چکیده

We apply blind source separation techniques from statistical signal processing to separate the traffic in a mix network into either individual flows or groups of flows. This separation requires no a priori information about the individual flows. As a result, unlinkability can be compromised without ever observing individual flows. Our experiments show that this attack is effective and scalable. By correlating separated groups of flows across nodes, a passive attacker can get an accurate traffic map of the mix network. We use a non-trivial network to show that the combined attack works. The experiments also show that multicast traffic can be dangerous for anonymity networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distilling the Internet's Application Mix from Packet-Sampled Traffic

As the Internet continues to grow both in size and in terms of the volume of traffic it carries, more and more networks in the different parts of the world are relying on an increasing number of distinct ways to exchange traffic with one another. As a result, simple questions such as “What is the application mix in today’s Internet?” may produce non-informative simple answers unless they are re...

متن کامل

Unmixing the directional reflectances of AVHRR sub-pixel landcovers

Recent progress in canopy bidirectional reflectance distribution function (BRDF) model inversions has allowed accurate estimates of vegetation biophysical characteristics from remotely sensed multi-angle optical data. Since most current BRDF inversion methods utilize one-dimensional (1-D) models, surface homogeneity within an image pixel is implied. The Advanced Very High Resolution Radiometer ...

متن کامل

جداسازی طیفی و مکانی تصاویر ابرطیفی با استفاده از Semi-NMF و تبدیل PCA

Unmixing of remote-sensing data using nonnegative matrix factorization has been considered recently. To improve performance, additional constraints are added to the cost function. The main challenge is to introduce constraints that lead to better results for unmixing. Correlation between bands of Hyperspectral images is the problem that is paid less attention to it in the unmixing algorithms. I...

متن کامل

On Flow Correlation Attacks and Countermeasures in Mix Networks

In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures that can defeat various traffic analysis attacks. In this paper, we focus on a particular class of traffic analysis attack, flow correlation attacks, by which an advers...

متن کامل

Anomaly Protection Using Batching Strategies

Traffic analysis is typically countered by the use of intermediary nodes, whose role is to perturb the traffic flow and thus confuse an external observer. Such intermediaries are called mixes. We address attacks that exploit the timing behaviour of TCP and other protocols and applications in low-latency anonymity networks. Intermediaries delay and reroute exchanged messages, reorder them, pad t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005