2015
DOI: 10.1002/sec.1219
|View full text |Cite
|
Sign up to set email alerts
|

Privacy enhancement in anonymous network channels using multimodality injection

Abstract: The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto-types. The random walk mechanism is responsible for generating network patterns, and the cryptoty… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 39 publications
(42 reference statements)
0
5
0
Order By: Relevance
“…Results of earlier work on random based anonymous channels led to designing random walk based pattern simulator called RAPS . The RAPS can generate random patterns for anonymous channels using random walk.…”
Section: Implementation and Experimental Resultsmentioning
confidence: 99%
“…Results of earlier work on random based anonymous channels led to designing random walk based pattern simulator called RAPS . The RAPS can generate random patterns for anonymous channels using random walk.…”
Section: Implementation and Experimental Resultsmentioning
confidence: 99%
“…Traffic analysis is useful for security enhancement in an enterprise network; however, it would endanger privacy and security of users' applications [4]. Some methods are able to detect encrypted network flows using traffic patterns.…”
Section: Traffic Analysismentioning
confidence: 99%
“…Depending on the application, however, it is possible to perform the entire analysis without some of them [3]. In applications such as Tor, which uses multi-layered encrypted packets, direction is not accessible [4]. To perform an accurate analysis, we need to access at least two of the mentioned features.…”
Section: Traffic Analysismentioning
confidence: 99%
See 2 more Smart Citations