Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. Shmatikov, V. & Wang, M. September 2006.
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses [link]Paper  doi  abstract   bibtex   
Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship between its origin and destination. Using a realistic model of interactive Internet traffic, we study the problem of defending low-latency mix networks against attacks based on correlating inter-packet intervals on two or more links of the mix chain. We investigate several attack models, including an active attack which involves adversarial modification of packet flows in order to \textquotedblleftfingerprint\textquotedblright them, and analyze the tradeoffs between the amount of cover traffic, extra latency, and anonymity properties of the mix network. We demonstrate that previously proposed defenses are either ineffective, or impose a prohibitively large latency and/or bandwidth overhead on communicating applications. We propose a new defense based on adaptive padding.
@conference {ShWa-Timing06,
	title = {Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses},
	booktitle = {Proceedings of ESORICS 2006},
	year = {2006},
	month = {September},
	publisher = {Springer Berlin / Heidelberg},
	organization = {Springer Berlin / Heidelberg},
	abstract = {Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship between its origin and destination. Using a realistic model of interactive Internet traffic, we study the problem of defending low-latency mix networks against attacks based on correlating inter-packet intervals on two or more links of the mix chain. We investigate several attack models, including an active attack which involves adversarial modification of packet flows in order to {\textquotedblleft}fingerprint{\textquotedblright} them, and analyze the tradeoffs between the amount of cover traffic, extra latency, and anonymity properties of the mix network. We demonstrate that previously proposed defenses are either ineffective, or impose a prohibitively large latency and/or bandwidth overhead on communicating applications. We propose a new defense based on adaptive padding.},
	keywords = {anonymity},
	isbn = {978-3-540-44601-9},
	doi = {10.1007/11863908},
	url = {http://www.springerlink.com/content/3n136578m4211484/},
	author = {Vitaly Shmatikov and Ming-Hsui Wang}
}

Downloads: 0