EVALUATING THE EFFECTIVENESS OF ANONYMITY COMMUNICATION SYSTEMS AGAINST MALICIOUS INSIDERS
The traffic analysis problem is one in which the communication partners of Internet users are learned by unrelated parties.Few works have been devoted to evaluating the effectiveness of the proposed anonymity designs.This paper proposes a unique adversary model to quantitatively measure how much precise information an attacker can obtain while subverting anonymity systems.The results of simulation experiments offer some insights into designs of anonymity protocols: (1) longer routing paths do not necessarily preserve anonymity better; (2) as the attacker controls more nodes, cyclic loops tend to create more confusing effects with overwhelming information; (3) reputation-based route selection may increase the efficiency, as long as the trusted routing nodes are truly trustworthy.
Anonymity Traffic analysis problem Mix-net
GEN-YIH LIAO
Department of Information Management, College of Management, Chang Gung University, 259 Wen-Hwa 1st Road, Kwei-Shan, 333 Tao-Yuan, Taiwan
国际会议
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
香港
英文
1838-1844
2007-08-19(万方平台首次上网日期,不代表论文的发表时间)