2006
DOI: 10.1007/11863908_2
|View full text |Cite
|
Sign up to set email alerts
|

Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses

Abstract: Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship between its origin and destination. Using a realistic model of interactive Internet traffic, we study the problem of defending low-latency mix networks against attacks based on correlating inter-packet intervals on two or more links of the mix chain. We investigate several attack models, including an active attack which involves adversa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
164
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 201 publications
(166 citation statements)
references
References 25 publications
2
164
0
Order By: Relevance
“…Adaptive Padding (AP) was proposed by Shmatikov and Wang to defend against end-to-end traffic analysis [18]. Even though WF attacks are significantly different from these end-to-end attacks, AP can be adapted to protecting against WF due to its generality and flexibility.…”
Section: Adaptive Paddingmentioning
confidence: 99%
See 3 more Smart Citations
“…Adaptive Padding (AP) was proposed by Shmatikov and Wang to defend against end-to-end traffic analysis [18]. Even though WF attacks are significantly different from these end-to-end attacks, AP can be adapted to protecting against WF due to its generality and flexibility.…”
Section: Adaptive Paddingmentioning
confidence: 99%
“…AP has the defender examine the outgoing traffic pattern and generate dummy messages in a targeted manner to disrupt distinctive features of the patterns -"statistically unlikely" delays between packets. Shmatikov and Wang showed that with 50% bandwidth overhead, the accuracy of end-to-end timing-based traffic analysis is significantly degraded [18].…”
Section: Adaptive Paddingmentioning
confidence: 99%
See 2 more Smart Citations
“…This choice means that Tor circuits are vulnerable to endto-end correlation attacks: an attacker who can measure traffic at both ends of the circuit can link them [10,28]. A variety of other anonymity-breaking attacks become possible because of Tor's requirement to remain useful for low-latency communications [26,29,35,36,41,44].…”
Section: Introductionmentioning
confidence: 99%