Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Clemson University

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Traffic Analysis Of Anonymity Systems, Ryan Craven May 2010

Traffic Analysis Of Anonymity Systems, Ryan Craven

All Theses

This research applies statistical methods in pattern recognition to test the privacy capabilities of a very popular anonymity tool used on the Internet known as Tor.
Using a recently developed algorithm known as Causal State Splitting and Reconstruction (CSSR), we can create hidden Markov models of network processes proxied through Tor. In contrast to other techniques, our CSSR extensions create a minimum entropy model without any prior knowledge of the underlying state structure. The inter-packet time delays of the network process, preserved by Tor, can be symbolized into ranges and used to construct the models.
After the construction of training …