• DocumentCode
    467802
  • Title

    Evaluating the Effectiveness of Anonymity Communication Systems Against Malicious Insiders

  • Author

    Liao, Gen-Yih

  • Author_Institution
    Chang Gung Univ., Kwei-Shan
  • Volume
    4
  • fYear
    2007
  • fDate
    19-22 Aug. 2007
  • Firstpage
    1838
  • Lastpage
    1844
  • Abstract
    The traffic analysis problem is one in which the communication partners of Internet users are learned by unrelated parties. Few works have been devoted to evaluating the effectiveness of the proposed anonymity designs. This paper proposes a unique adversary model to quantitatively measure how much precise information an attacker can obtain while subverting anonymity systems. The results of simulation experiments offer some insights into designs of anonymity protocols: (1) longer routing paths do not necessarily preserve anonymity better; (2) as the attacker controls more nodes, cyclic loops tend to create more confusing effects with overwhelming information; (3) reputation-based route selection may increase the efficiency, as long as the trusted routing nodes are truly trustworthy.
  • Keywords
    telecommunication network routing; telecommunication security; telecommunication traffic; anonymity communication systems; anonymity designs; malicious insiders; reputation-based route selection; routing paths; traffic analysis problem; Communication system traffic; Computer architecture; Cryptography; Cybernetics; Detectors; Machine learning; Peer to peer computing; Privacy; Protection; Routing; Anonymity; Mix-net; Traffic analysis problem;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Machine Learning and Cybernetics, 2007 International Conference on
  • Conference_Location
    Hong Kong
  • Print_ISBN
    978-1-4244-0973-0
  • Electronic_ISBN
    978-1-4244-0973-0
  • Type

    conf

  • DOI
    10.1109/ICMLC.2007.4370447
  • Filename
    4370447