Title :
Evaluating the Effectiveness of Anonymity Communication Systems Against Malicious Insiders
Author_Institution :
Chang Gung Univ., Kwei-Shan
Abstract :
The traffic analysis problem is one in which the communication partners of Internet users are learned by unrelated parties. Few works have been devoted to evaluating the effectiveness of the proposed anonymity designs. This paper proposes a unique adversary model to quantitatively measure how much precise information an attacker can obtain while subverting anonymity systems. The results of simulation experiments offer some insights into designs of anonymity protocols: (1) longer routing paths do not necessarily preserve anonymity better; (2) as the attacker controls more nodes, cyclic loops tend to create more confusing effects with overwhelming information; (3) reputation-based route selection may increase the efficiency, as long as the trusted routing nodes are truly trustworthy.
Keywords :
telecommunication network routing; telecommunication security; telecommunication traffic; anonymity communication systems; anonymity designs; malicious insiders; reputation-based route selection; routing paths; traffic analysis problem; Communication system traffic; Computer architecture; Cryptography; Cybernetics; Detectors; Machine learning; Peer to peer computing; Privacy; Protection; Routing; Anonymity; Mix-net; Traffic analysis problem;
Conference_Titel :
Machine Learning and Cybernetics, 2007 International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4244-0973-0
Electronic_ISBN :
978-1-4244-0973-0
DOI :
10.1109/ICMLC.2007.4370447