The bayesian traffic analysis of mix networks. Troncoso, C. & Danezis, G. 2009.
Paper doi abstract bibtex This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network architectures is presented, that incorporates a number of attack techniques in the traffic analysis literature. We use the model to build an Markov Chain Monte Carlo inference engine, that calculates the probabilities of who is talking to whom given an observation of network traces. We provide a thorough evaluation of its correctness and performance, and confirm that mix networks with realistic parameters are secure. This approach enables us to apply established information theoretic anonymity metrics on complex mix networks, and extract information from anonymised traffic traces optimally.
@conference {DBLP:conf/ccs/TroncosoD09,
title = {The bayesian traffic analysis of mix networks},
booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009},
year = {2009},
pages = {369{\textendash}379},
publisher = {ACM},
organization = {ACM},
abstract = {This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network architectures is presented, that incorporates a number of attack techniques in the traffic analysis literature. We use the model to build an Markov Chain Monte Carlo inference engine, that calculates the probabilities of who is talking to whom given an observation of network traces. We provide a thorough evaluation of its correctness and performance, and confirm that mix networks with realistic parameters are secure. This approach enables us to apply established information theoretic anonymity metrics on complex mix networks, and extract information from anonymised traffic traces optimally.},
keywords = {anonymity, Markov chain, traffic analysis},
isbn = {978-1-60558-894-0},
doi = {10.1145/1653662.1653707},
url = {http://portal.acm.org/citation.cfm?id=1653662.1653707},
author = {Carmela Troncoso and George Danezis},
editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis}
}
Downloads: 0
{"_id":"LXxb4aL3uTo2zNS37","bibbaseid":"troncoso-danezis-thebayesiantrafficanalysisofmixnetworks-2009","downloads":0,"creationDate":"2018-07-03T04:50:27.774Z","title":"The bayesian traffic analysis of mix networks","author_short":["Troncoso, C.","Danezis, G."],"year":2009,"bibtype":"conference","biburl":"https://gnunet.org/bibliography/export/bibtex","bibdata":{"bibtype":"conference","type":"conference","title":"The bayesian traffic analysis of mix networks","booktitle":"Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009","year":"2009","pages":"369\\textendash379","publisher":"ACM","organization":"ACM","abstract":"This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network architectures is presented, that incorporates a number of attack techniques in the traffic analysis literature. We use the model to build an Markov Chain Monte Carlo inference engine, that calculates the probabilities of who is talking to whom given an observation of network traces. We provide a thorough evaluation of its correctness and performance, and confirm that mix networks with realistic parameters are secure. This approach enables us to apply established information theoretic anonymity metrics on complex mix networks, and extract information from anonymised traffic traces optimally.","keywords":"anonymity, Markov chain, traffic analysis","isbn":"978-1-60558-894-0","doi":"10.1145/1653662.1653707","url":"http://portal.acm.org/citation.cfm?id=1653662.1653707","author":[{"firstnames":["Carmela"],"propositions":[],"lastnames":["Troncoso"],"suffixes":[]},{"firstnames":["George"],"propositions":[],"lastnames":["Danezis"],"suffixes":[]}],"editor":[{"firstnames":["Ehab"],"propositions":[],"lastnames":["Al-Shaer"],"suffixes":[]},{"firstnames":["Somesh"],"propositions":[],"lastnames":["Jha"],"suffixes":[]},{"firstnames":["Angelos","D."],"propositions":[],"lastnames":["Keromytis"],"suffixes":[]}],"bibtex":"@conference {DBLP:conf/ccs/TroncosoD09,\n\ttitle = {The bayesian traffic analysis of mix networks},\n\tbooktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009},\n\tyear = {2009},\n\tpages = {369{\\textendash}379},\n\tpublisher = {ACM},\n\torganization = {ACM},\n\tabstract = {This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network architectures is presented, that incorporates a number of attack techniques in the traffic analysis literature. We use the model to build an Markov Chain Monte Carlo inference engine, that calculates the probabilities of who is talking to whom given an observation of network traces. We provide a thorough evaluation of its correctness and performance, and confirm that mix networks with realistic parameters are secure. This approach enables us to apply established information theoretic anonymity metrics on complex mix networks, and extract information from anonymised traffic traces optimally.},\n\tkeywords = {anonymity, Markov chain, traffic analysis},\n\tisbn = {978-1-60558-894-0},\n\tdoi = {10.1145/1653662.1653707},\n\turl = {http://portal.acm.org/citation.cfm?id=1653662.1653707},\n\tauthor = {Carmela Troncoso and George Danezis},\n\teditor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis}\n}\n","author_short":["Troncoso, C.","Danezis, G."],"editor_short":["Al-Shaer, E.","Jha, S.","Keromytis, A. D."],"key":"DBLP:conf/ccs/TroncosoD09","id":"DBLP:conf/ccs/TroncosoD09","bibbaseid":"troncoso-danezis-thebayesiantrafficanalysisofmixnetworks-2009","role":"author","urls":{"Paper":"http://portal.acm.org/citation.cfm?id=1653662.1653707"},"keyword":["anonymity","Markov chain","traffic analysis"],"downloads":0},"search_terms":["bayesian","traffic","analysis","mix","networks","troncoso","danezis"],"keywords":["anonymity","markov chain","traffic analysis"],"authorIDs":[],"dataSources":["FWsPTwsmjtrBtRS3B"]}