Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society 2003
DOI: 10.1145/1005140.1005154
|View full text |Cite
|
Sign up to set email alerts
|

Heartbeat traffic to counter (n-1) attacks

Abstract: A dummy traffic strategy is described that can be implemented by mix nodes in an anonymous communication network to detect and counter active (n − 1) attacks and their variants. Heartbeat messages are sent anonymously from the mix node back to itself in order to establish its state of connectivity with the rest of the network. In case the mix is under attack, the flow of heartbeat messages is interrupted and the mix takes measures to preserve the quality of the anonymity it provides by introducing decoy messag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2005
2005
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…Flooding attack is also known as n-1 attack [24]. The attacker can pick up the information of interest in the system through the flood attack.…”
Section: Flooding Attackmentioning
confidence: 99%
“…Flooding attack is also known as n-1 attack [24]. The attacker can pick up the information of interest in the system through the flood attack.…”
Section: Flooding Attackmentioning
confidence: 99%
“…RGB Mixes. While none of the flushing algorithms proposed to date have entirely eliminated the threat of the simple but effective (n − 1) attack, Danezis and Sassaman [2003] proposed a technique for detecting when an attacker is conducting the attack, and minimizing its negative impact on the anonymity of legitimate messages. The authors called their approach Red-Green-Black (RGB) mixes.…”
Section: Stop-and-gomentioning
confidence: 99%
“…Though some countermeasures Gülcü and Tsudik, 1996;Möller et al, 2003;Kesdogan et al, 1998;Danezis and Sassaman, 2003) have been proposed to defend (n À 1) attack, none of them can thwart it completely. However, WonGoo can successively protect against (n À 1) attack.…”
Section: Security Assessmentmentioning
confidence: 99%