Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Faculty Publications

Anonymity

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Correlation-Based Traffic Analysis Attacks On Anonymity Networks, Ye Zhu, Xinwen Fu, Byran Gramham, Riccardo Bettati, Wei Zhao Jul 2010

Correlation-Based Traffic Analysis Attacks On Anonymity Networks, Ye Zhu, Xinwen Fu, Byran Gramham, Riccardo Bettati, Wei Zhao

Electrical and Computer Engineering Faculty Publications

In this paper, we address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures to defeat traffic analysis attacks. In this paper, we focus on a particular class of traffic analysis attacks, flow-correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link with that over an output link. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. Based on our …


Information Leakage As A Model For Quality Of Anonymity Networks, Ye Zhu, Riccardo Bettati Apr 2009

Information Leakage As A Model For Quality Of Anonymity Networks, Ye Zhu, Riccardo Bettati

Electrical and Computer Engineering Faculty Publications

Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are heterogeneous, as are the ways they are used, the deployed anonymity measures, and finally the possible attack methods. Implementation quality and topologies of the anonymity measures must be considered as well. We therefore propose a new measure for the anonymity degree, that takes into account these various. We model the effectiveness of single mixes or of mix networks in terms of information leakage, and we measure it in terms of covert channel capacity. …