Filters








31,150 Hits in 5.4 sec

A de-anonymize attack method based on traffic analysis

Ming Song, Gang Xiong, Zhenzhen Li, Junrui Peng, Li Guo
2013 2013 8th International Conference on Communications and Networking in China (CHINACOM)  
We develop a deanonymize attack method based on traffic analysis and choose the {time, stream size} as features for k-means algorithm to mine the association between the first hop traffic and last hop  ...  We study the problem how to break the unlinkability between the senders and recipients in order to identify the source of anonymous traffic in this paper.  ...  In this paper, a de-anonymize attack based on traffic analysis is proposed. Machine learning tools are applied to data analysis.  ... 
doi:10.1109/chinacom.2013.6694639 fatcat:qg22s6pr7rftlpoa2hmpbknqcm

POSTER

Katharina Siobhan Kohls, Christina Poepper
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
One open research question in the field of anonymity networks therefore addresses efficient countermeasures to the class of traffic analysis attacks.  ...  Recent work proved that powerful traffic analysis attacks exist which enable an adversary to relate traffic streams in the network and identify users and accessed contents.  ...  COUNTERMEASURES TO TRAFFIC ANALYSIS ATTACKS We focus on two main design aspects for anonymity systems. First, their security features define the expected protection against traffic analysis attacks.  ... 
doi:10.1145/3052973.3055159 dblp:conf/ccs/KohlsP17 fatcat:3k2bklzbsvctdp64nz26ahqgpm

An Analysis of Active Attacks on Anonymity Systems

Tianbo Lu, Pan Gao, Xiaofeng Du, Yang Li
2016 International Journal of Security and Its Applications  
However, with the development of anonymous technology, P2P network attack technology has become the focus of research. This paper mainly analyzes the typical active attack technology.  ...  Therefore, it is of important theoretical significance and application value to study the anonymous technology in P2P network environment.  ...  For example, traffic analysis is passive attacks, and denial of service attacks is active attack. This paper mainly studies the passive attack technology in anonymous communication system.  ... 
doi:10.14257/ijsia.2016.10.4.11 fatcat:7jx4wlj65jghnd7tk32xjmmfca

Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research [article]

Saad Saleh, Junaid Qadir, Muhammad U. Ilyas
2018 arXiv   pre-print
In this survey paper, we summarize, analyze, classify and quantify 26 years of research on the Tor network.  ...  Anonymity services have seen high growth rates with increased usage in the past few years. Among various services, Tor is one of the most popular peer-to-peer anonymizing service.  ...  Tor Traffic Analysis Attacks A few studies have focused on the analysis of Tor traffic for breaching this network.  ... 
arXiv:1803.02816v1 fatcat:kl5fkcq5tnbczblpgdesatocji

The role of network trace anonymization under attack

Martin Burkhart, Dominik Schatzmann, Brian Trammell, Elisa Boschi, Bernhard Plattner
2010 Computer communication review  
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques.  ...  We demonstrate that performing live traffic injection attacks against anonymization on a backbone network is not difficult, and that potential countermeasures against these attacks, such as traffic aggregation  ...  Acknowledgments We are grateful to SWITCH for providing the traffic traces used in this study.  ... 
doi:10.1145/1672308.1672310 fatcat:cqfzlualt5ewnhxlkzfqj62age

Mix-Networks with Restricted Routes [chapter]

George Danezis
2003 Lecture Notes in Computer Science  
We analyse the anonymity such networks provide, and compare it with fully connected mix networks and mix cascades.  ...  A worked example of a network is also presented to illustrate how these results can be applied to create secure mix networks in practise.  ...  author would like to thank Andrei Serjantov for the invaluable provocative discussions that greatly improved this work, and Richard Clayton for clearly formulating the problem surrounding intersection attacks  ... 
doi:10.1007/978-3-540-40956-4_1 fatcat:dcxj6dmh3fhcxb4vdzmsgb43j4

A Survey of Privacy Protection and Network Security in User On-Demand Anonymous Communication

Yun He, Min Zhang, Xiaolong Yang, Jingtang Luo, Yiming Chen
2020 IEEE Access  
Nevertheless, the defense capabilities against attacks in user on-demand anonymous communication are insufficient in anonymous protection ability [7] and resistance to traffic analysis attacks [8], [9]  ...  Some malicious users in the network employ anonymous communication to hide their identities and attack the Internet.  ...  In addition, the transmission paths are vulnerable to traffic analysis attacks. C.  ... 
doi:10.1109/access.2020.2981517 fatcat:okn6x7b7jndd5d2wpzq65x46zm

Anonymity on QuickSand

Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal
2014 Proceedings of the 13th ACM Workshop on Hot Topics in Networks - HotNets-XIII  
Third, an AS can perform timing analysis even when it sees only one direction of the traffic at both communication ends.  ...  Actually, asymmetric routing increases the fraction of ASes able to analyze a user's traffic. We present a preliminary evaluation of our attacks using measurements of BGP and Tor.  ...  Asymmetric Traffic Analysis In this section, we present a novel traffic-analysis attack that AS-level adversaries can use to compromise user anonymity.  ... 
doi:10.1145/2670518.2673869 dblp:conf/hotnets/VanbeverLRM14 fatcat:27ikvk6wybggte4gbyxey4szfu

Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks [article]

M. Razvi Doomun, K.M. Sunjiv Soyjaudah
2012 arXiv   pre-print
In wireless ad hoc networks, protecting source and destination nodes location privacy is a challenging task due to malicious traffic analysis and privacy attacks.  ...  Existing solutions, such as incorporating fake source destination pairs in the network, provide some privacy of real source and destination nodes against attackers.  ...  Uniformly distributed traffic in an ad hoc wireless network exhibits superior unlinkability performance under traffic analysis attacks. IV.  ... 
arXiv:1208.5569v1 fatcat:ekaqwsiokrc5jcyzuced4hb7he

DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network

Tianxiang Shen, Jianyu Jiang, Yunpeng Jiang, Xusheng Chen, Ji Qi, Shixiong Zhao, Fengwei Zhang, Xiapu Luo, Heming Cui
2021 IEEE Transactions on Dependable and Secure Computing  
Index Terms-Scalable anonymous communication, P2P network, Mix network, SGX, Traffic analysis attack, DoS attack. !  ...  Traditional anonymous networks (e.g., Tor) are vulnerable to traffic analysis attacks that monitor the whole network traffic to determine which users are communicating.  ...  Defending Against Passive Traffic Analysis Attacks Attack Assumptions: Passive traffic analysis attacks intercept network packets to observe traffic patterns in order to de-anonymize participants.  ... 
doi:10.1109/tdsc.2021.3052831 fatcat:dggaab67nnaadddrtvegsdvlse

Social networking for anonymous communication systems: A survey

Rodolphe Marques, Andre Zuquete
2011 2011 International Conference on Computational Aspects of Social Networks (CASoN)  
Recent research shows that by using social networking features it is possible to prevent traffic analysis attacks and even detect Sybil attacks.  ...  A lot has been done, since Chaum's seminal paper on mix networks, in preventing attacks able to undermine the anonymity provided by these systems.  ...  Attacks on anonymous communication systems have been thoroughly studied, most of them being passive attacks through traffic analysis.  ... 
doi:10.1109/cason.2011.6085953 dblp:conf/cason/MarquesZ11 fatcat:ea52akggr5f75kbzdbtc3lhyke

An Analytical Perspective to Traffic Engineering in Anonymous Communication Systems [article]

Mehran Alidoost Nia, Eduard Babulak, Benjamin Fabian, Reza Ebrahimi Atani
2017 arXiv   pre-print
In the recent years, anonymity applications faced many problems regarding traffic engineering methods.  ...  To address these issues, this study is devoted to investigating traffic-engineering methods in anonymous communication systems, and proposes an analytical view of the current issues in ACS privacy and  ...  ACKNOWLEDGMENT We would like to appreciate Antonio Ruiz-Martinez for his considerable help and contributions in our previous research works related to anonymous communication systems.  ... 
arXiv:1712.07601v1 fatcat:lv6yjjswdbhfplf53z66a3jhmi

RAPTOR: Routing Attacks on Privacy in Tor [article]

Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
2015 arXiv   pre-print
The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path.  ...  In this paper, we show that prior attacks are just the tip of the iceberg.  ...  Asymmetric Traffic Analysis In this section, we experimentally show that asymmetric traffic analysis attacks are feasible. We use the live Tor network for our experiments.  ... 
arXiv:1503.03940v1 fatcat:rlm5dfm2pja67dfmow7yo46c4y

Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems [chapter]

Adam Back, Ulf Möller, Anton Stiglic
2001 Lecture Notes in Computer Science  
Although Freedom is efficient and reasonably secure against denial of service attacks, it is vulnerable to some generic traffic analysis attacks, which we describe.  ...  On the other hand, we look at PipeNet, a simple theoretical model which protects against the traffic analysis attacks we point out, but is vulnerable to denial of services attacks and has efficiency problems  ...  Acknowledgements We thank Wei Dai for discussions on PipeNet, and Adam Shostack for general discussions on traffic analysis.  ... 
doi:10.1007/3-540-45496-9_18 fatcat:abj476orfzaizoazg4mmrapwb4

Review on Attack and Defense in Tor

Muhammad Aamir
2012 International Journal of Information and Network Security (IJINS)  
Tor is currently the most famous tool of anonymous TCP communications for clients who need security, privacy and anonymity in their low-latency communications over the public network such as Internet.  ...  Countermeasures against such attacks are also identified to increase security and anonymity over Tor based communications.  ...  It also assumes that the attacker has inserted a malicious entry node in the network which is used for traffic analysis or illicit snooping.  ... 
doi:10.11591/ijins.v1i2.468 fatcat:zebnr5rf6zbgpdooqb6nhx6gfa
« Previous Showing results 1 — 15 out of 31,150 results