2003
DOI: 10.1007/3-540-36467-6_9
|View full text |Cite
|
Sign up to set email alerts
|

Dummy Traffic against Long Term Intersection Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 69 publications
(60 citation statements)
references
References 6 publications
0
60
0
Order By: Relevance
“…Dummy traffic has been discussed with regard to several attack schemes [13,14,15]. In general, it has been found to be a rather weak countermeasure in packet-switched networks.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Dummy traffic has been discussed with regard to several attack schemes [13,14,15]. In general, it has been found to be a rather weak countermeasure in packet-switched networks.…”
Section: Discussionmentioning
confidence: 99%
“…Let p be the probability that both events are caused by the same user. 13 Further, as illustrated in Fig. 4, let A be the set of suspect senders (i.e., the result of a cross-section attack) at the time of E 1 and B the set of suspects for E 2 .…”
Section: Probabilistic Intersection Attacksmentioning
confidence: 99%
“…Since the intersection of two different anonymity sets is likely to be smaller than either of the anonymity sets (due to the assumed regularity in behavior), different intersections of anonymity sets could be used to gain information about the targeted user (see for such an analysis e.g. [18,19]). …”
Section: Related Work: Vulnerabilities Of the Mixesmentioning
confidence: 99%
“…We believe that such an adversary is impractical for large and dynamic P2P systems, though many of these attacks can be thwarted by means of cover traffic [52]. 16 This assumes that the initiator and responder are within the portion of the network observed by the adversary.…”
Section: Mutual Anonymity In Muonmentioning
confidence: 99%