2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2010
DOI: 10.1109/euc.2010.90
|View full text |Cite
|
Sign up to set email alerts
|

On the Sender Cover Traffic Countermeasure against an Improved Statistical Disclosure Attack

Abstract: Abstract-The Statistical Disclosure Attack against a particular user of an anonymity system is known to be very effective in determining, after long-term observation of the system, the set of receivers that user sends messages to. This paper first presents an improvement over this attack that, by employing a weighted mean of the observed relative receiver popularity, is more accurate than the original one based upon arithmetic mean. Second, a mathematical analysis is presented of this attack on a model, in whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…al. have focused on using the weighted mean instead of the arithmetic mean of the observed relative receiver popularity and their mathematical analysis on the attack model verifies their claim of the attacker not being obstacled by the sender-generated dummy traffic [13]. Troncoso et.…”
Section: Related Workmentioning
confidence: 95%
“…al. have focused on using the weighted mean instead of the arithmetic mean of the observed relative receiver popularity and their mathematical analysis on the attack model verifies their claim of the attacker not being obstacled by the sender-generated dummy traffic [13]. Troncoso et.…”
Section: Related Workmentioning
confidence: 95%
“…In [ 18 ], an extension to the statistical disclosure attack, called SDA-2H, is presented, considering the situation where cover traffic, in the form of fake or dummy messages, is employed as a defense.…”
Section: The Family Of MIX Systems Attacksmentioning
confidence: 99%
“…On the other hand, deceptive packets were used to generate cover traffic to conceal the identity of sender-receiver pairs. The goal is to change the profile of the network traffic to counter statistical disclosure attacks that opt to determine recipients of a specific sender node [18][19] [20]. However, these techniques were not designed to protect a sink node that receives all packets.…”
Section: Related Workmentioning
confidence: 99%