Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions 2000
DOI: 10.1145/332186.332211
|View full text |Cite
|
Sign up to set email alerts
|

Project “anonymity and unobservability in the Internet”

Abstract: Abstract. It is a hard problem to achieve anonymity for real-time services in the Internet (e.g. Web access). All existing concepts fail when we assume a very strong attacker model (i.e. an attacker is able to observe all communication links). We also show that these attacks are realworld attacks. This paper outlines alternative models which mostly render these attacks useless. Our present work tries to increase the efficiency of these measures. 1ÊÊThe perfect system 1.1ÊÊ AttacksThe perfect anonymous communic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 97 publications
(63 citation statements)
references
References 3 publications
0
62
0
Order By: Relevance
“…( An attacker may use various kinds of attacks in order to expose the sender and the recipient such as those described by Berthold et al (2000), Raymond (2001), or Song and Korba (2002). Some of the attacks are categorized as "general traffic analysis attacks".…”
Section: Anonymity In the Webmentioning
confidence: 99%
“…( An attacker may use various kinds of attacks in order to expose the sender and the recipient such as those described by Berthold et al (2000), Raymond (2001), or Song and Korba (2002). Some of the attacks are categorized as "general traffic analysis attacks".…”
Section: Anonymity In the Webmentioning
confidence: 99%
“…In all these applications anonymity protects the identity of the sender or receiver and guarantees that both parties involved in a communication transaction remain anonymous to each other. Recent years have seen a flurry of activity and many anonymous communication systems have been developed for the Internet [3,7,8,9,11,32,33,34,41,43,61,62]. Most of the work on anonymity is concerned with sender anonymity, receiver anonymity, and mutual anonymity.…”
Section: What Is Anonymity?mentioning
confidence: 99%
“…The strategies include introducing random delay; buffering messages in a pool, reordering messages and flushing the pool; injecting dummy/decoy packets; and padding each packet to the same length or random lengths. For example, a delay-and-playout technique (traffic mixing) is used in [2] [14]. Serjantov et al [17] classify traffic mixing strategies into two major categories-simple MIXes and pool MIXes.…”
Section: B Related Workmentioning
confidence: 99%
“…Successful correlation between two transmission events reveals the path of a data flow. Solutions studied for wired networks [2][4] [14][17] use traffic mixing techniques including sending messages in reordered batches, sending decoy/dummy messages, and introducing random delays. However, sensor networks have features different from a wired network, requiring reevaluation of the existing work and new designs of anti timing analysis solutions.…”
Section: Introductionmentioning
confidence: 99%