2020
DOI: 10.1109/tifs.2019.2919870
|View full text |Cite
|
Sign up to set email alerts
|

Fundamental Limits of Invisible Flow Fingerprinting

Abstract: Network flow fingerprinting can be used to de-anonymize communications on anonymity systems such as Tor by linking the ingress and egress segments of anonymized connections. Assume Alice and Bob have access to the input and the output links of an anonymous network, respectively, and they wish to collaboratively reveal the connections between the input and the output links without being detected by Willie who protects the network. Alice generates a codebook of fingerprints, where each fingerprint corresponds to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Our results are readily extended to the case where P(H 0 ) = P(H 1 ) since minimizing P F A + P M D is applicable when P(H 0 ) = P(H 1 ) [27].…”
Section: B Hypothesis Testingmentioning
confidence: 87%
“…Our results are readily extended to the case where P(H 0 ) = P(H 1 ) since minimizing P F A + P M D is applicable when P(H 0 ) = P(H 1 ) [27].…”
Section: B Hypothesis Testingmentioning
confidence: 87%
“…Similar to the definition of covertness in [1], [2], [16]- [18], [67], [68], and invisibility in [69], [70], we define covertness: We present results under the assumption that P(H 0 ) = P(H 1 ) = 1/2. However, this results in covertness for the general case [71, Appendix A].…”
Section: B Definitionsmentioning
confidence: 99%
“…When the embedded watermark is 1, the intervals corresponding to the watermarks of the A and B groups are compressed use (5). Here, A i is increased and B i is decreased.…”
Section: Analysis Of the Invisibility Of Common Interval Centroid Based Watermarking Schemementioning
confidence: 99%
“…The attack can be used to detect the watermark carried in the network flow, even recover the watermark parameter to remove the watermark in the network flow. This scheme can also be used to detect network flows carrying different watermarks [5].…”
Section: Introductionmentioning
confidence: 99%