Anonymity Analysis of Mix Networks Against Flow-Correlation Attacks Conference Paper uri icon

abstract

  • Mix networks are designed to provide anonymity for users in a variety of applications, including anonymous web browsing and numerous E-commerce systems. Such networks have been shown to be susceptible to flow correlation attacks empirically. In this paper, we model the effectiveness of flow correlation attacks. Our results illustrate the quantitative relationship among system parameters such as sample size, noise level, payload flow rate, and detection rate. Our analysis quantitatively predicts how existing flow-based anonymous systems would fail under flow-correlation attacks, thus providing useful guidelines for the design of future anonymous systems. 2005 IEEE.

name of conference

  • GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.

published proceedings

  • GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.

author list (cited authors)

  • Zhu, Y. e., Fu, X., Bettati, R., & Zhao, W.

citation count

  • 8

complete list of authors

  • Zhu, Ye||Fu, Xinwen||Bettati, Riccardo||Zhao, Wei

publication date

  • January 2005