Sciweavers

PET
2004
Springer

On Flow Correlation Attacks and Countermeasures in Mix Networks

14 years 4 months ago
On Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures that can defeat various traffic analysis attacks. In this paper, we focus on a particular class of traffic analysis attack, flow correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link at a mix with that over an output link of the same mix. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. Based on our threat model and known strategies in existing mix networks, we perform extensive experiments to analyze the performance of mixes. We find that a mix with any known batching strategy may fail against flow correlation attacks in the sense that for a given flow over an input link, the adversary can correctly determine...
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati,
Added 02 Jul 2010
Updated 02 Jul 2010
Type Conference
Year 2004
Where PET
Authors Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
Comments (0)