2008 International Conference on Telecommunications 2008
DOI: 10.1109/ictel.2008.4652665
|View full text |Cite
|
Sign up to set email alerts
|

Cross-layer attack on anonymizing networks

Abstract: Abstract-Network layer anonymization protects only some of the user's personal identification information, namely network addresses of the communicating parties. However, even if the lower layers of communication provide perfect protection for the user's profile, information leakage on the application layer destroys the whole effort. Currently, all widespread implementations of anonymizing networks do not use a holistic approach and therefore, neither filter nor actively warn users about information leakage fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…If the attacker uses a small CW value, it can preempt the channel and prevent others from accessing the channel with a high probability [2]. Cross-layer attacks in other types of wireless networks have been reported in the literature [15][16][17][18][19][20]. Some of these cross-layer attacks achieve similar goals as the attack described in this paper, but because of the nature of these networks, they do not have to consider the effect of the spectrum.…”
Section: Related Work 21 Security Attacks In Crsmentioning
confidence: 83%
“…If the attacker uses a small CW value, it can preempt the channel and prevent others from accessing the channel with a high probability [2]. Cross-layer attacks in other types of wireless networks have been reported in the literature [15][16][17][18][19][20]. Some of these cross-layer attacks achieve similar goals as the attack described in this paper, but because of the nature of these networks, they do not have to consider the effect of the spectrum.…”
Section: Related Work 21 Security Attacks In Crsmentioning
confidence: 83%
“…An examination of raw data often reveals dependencies not accounted for in the sanitization, and that can be exploited to desanitize the data. For example, Panchenko and Pimenides [72] combine application-layer information with network-layer information to speed deanonymization of the traffic. Basically, they look for profiles of individuals at the upper layer, and once those are found, use them to filter the input for the attack on the network layer by eliminating combinations that do not fit the profiles.…”
Section: Undoing the Sanitizationmentioning
confidence: 99%
“…Due to the anonymization of the networks, the cross layer attackers have increased their efficiency [10].…”
Section: Effects Of Cross Layer Attacksmentioning
confidence: 99%
“…Andriy Panchenko et al [10] have proposed a cross layer attack on anonymizing networks. Network layer anonymization protects only some of the user's personal identification information, namely network addresses of the communicating parties.…”
Section: Literature Reviewmentioning
confidence: 99%