Title :
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
Author :
Zhu, Ye ; Fu, Xinwen ; Bettati, Riccardo
Author_Institution :
Dept. of Comput. Sci., Texas A&M Univ., College Station, TX
Abstract :
In flow-based mix networks, so-called flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In this paper, we theoretically analyze the effectiveness of a mix network under flow correlation attacks. Our formulae clearly show how a mix network will ultimately fail when an adversary has access to sufficiently long flow samples, independently of the type of flows (TCP or UDP). We illustrate the analysis methodology by modeling a continuous-time mix, which randomly delays each incoming packet. Our queuing-model-based analysis captures the essence of flow correlation attacks and can provide useful guidelines for designers who develop and deploy anonymity systems
Keywords :
queueing theory; telecommunication security; telecommunication traffic; transport protocols; TCP; UDP; anonymity system; continuous-time mix modeling; flow correlation attacks; flow-based mix network; packet delay; queuing-model; telecommunication security; telecommunication traffic; transport protocol; Aggregates; Communication systems; Computer science; Degradation; Delay; Guidelines; Queueing analysis; Telecommunication traffic; Timing; Traffic control;
Conference_Titel :
Network Computing and Applications, Fourth IEEE International Symposium on
Conference_Location :
Cambridge, MA
Print_ISBN :
0-7695-2326-9
DOI :
10.1109/NCA.2005.37