Skip to main content

Advertisement

SpringerLink
  • Log in
Book cover

European Symposium on Research in Computer Security

ESORICS 2003: Computer Security – ESORICS 2003 pp 116–131Cite as

  1. Home
  2. Computer Security – ESORICS 2003
  3. Conference paper
Passive Attack Analysis for Connection-Based Anonymity Systems

Passive Attack Analysis for Connection-Based Anonymity Systems

  • Andrei Serjantov6 &
  • Peter Sewell6 
  • Conference paper
  • 1116 Accesses

  • 56 Citations

Part of the Lecture Notes in Computer Science book series (LNCS,volume 2808)

Abstract

In this paper we consider low latency connection-based anonymity systems which can be used for applications like web browsing or SSH. Although several such systems have been designed and built, their anonymity has so far not been adequately evaluated.

We analyse the anonymity of connection-based systems against passive adversaries. We give a precise description of two attacks, evaluate their effectiveness, and calculate the amount of traffic necessary to provide a minimum degree of protection against them.

Keywords

  • Interarrival Time
  • Outgoing Link
  • Threat Model
  • Route Length
  • Collision Domain

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download conference paper PDF

References

  1. Boucher, P., Goldberg, I., Shostack, A.: Freedom system 2.0 architecture. Zero-Knowledge Sytems, Inc. (2000), http://www.freedom.net/info/whitepapers/

  2. Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245–257. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  3. Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  4. Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    CrossRef  Google Scholar 

  5. Cottrell, L.: Mixmaster and remailer attacks (1994), http://www.obscura.com/~loki/remailer/remailer-essay.html

  6. Danezis, G.: Mix-networks with restricted routes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 1–17. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  7. Danezis, G., Dingledine, R., Mathewson, N.: Type III (Mixminion) Mix Protocol Specifications (2002), http://mixminion.net/minion-spec.txt

  8. Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE Security and Privacy (2003)

    Google Scholar 

  9. Freedman, M.J., Morris, R.: Tarzan: A peer-to-peer anonymizing network layer. In: Computer and Communications Security, CCS (2002)

    Google Scholar 

  10. Goldschlag, D., Reed, M., Syverson, P.: Onion Routing for anonymous and private internet connections. Communications of the ACM 42(2), 39–41 (1999)

    CrossRef  Google Scholar 

  11. Gülcü, C., Tsudik, G.: Mixing Email with Babel. In: Internet Society Symposium on Network and Distributed Sytem Security, pp. 2–16 (1996)

    Google Scholar 

  12. Hodara, H.: Secure fiberoptic communications. In: Symposium on Electromagnetic Security for Information Protection, Rome, Italy (1991)

    Google Scholar 

  13. The JAP project, http://anon.inf.tu-dresden.de/index_en.html

  14. Kesdogan, D., Egner, J., Büschkes, R.: Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 83. Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  15. Moeller, U., Cottrell, L.: Mixmaster Protocol Version 3 (2000), http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-v3-01.txt

  16. Onion Routing developers mailing list, http://archives.seul.org/or/dev/

  17. Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: Untraceable communication with very small bandwidth overhead. In: Proceedings of the GI/ITG Conference on Communication in Distributed Systems, pp. 451–463 (1991)

    Google Scholar 

  18. Raymond, J.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  19. Rennhard, M.: Practical anonymity for the masses with mix-networks. Technical Report 157, ETH Zurich,Switzerland (2003)

    Google Scholar 

  20. Rennhard, M., Plattner, B.: Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection. In: Workshop on Privacy in the Electronic Society (WPES), Washington, DC, USA (2002)

    Google Scholar 

  21. Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A protocol for scalable anonymous communication. In: IEEE Security and Privacy (2002)

    Google Scholar 

  22. Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  23. Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 36–52. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  24. Shmatikov, V.: Probabilistic analysis of anonymity. In: 15th IEEE Computer Security Foundations Workshop, pp. 119–128 (2002)

    Google Scholar 

  25. Syverson, P.F., Tsudik, G., Reed, M.G., Landwehr, C.E.: Towards an analysis of Onion Routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, p. 96. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  26. Wright, M., Adler, M., Levine, B., Shields, C.: An analysis of the degradation of anonymous protocols. In: ISOC Symposium on Network and Distributed System Security (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. University of Cambridge Computer Laboratory, William Gates Building, JJ Thomson Avenue, Cambridge, CB3 0FD, United Kingdom

    Andrei Serjantov & Peter Sewell

Authors
  1. Andrei Serjantov
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Peter Sewell
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Norwegian Information Security Lab, Department of Computer Science and Media Technology, Gjovik University College, P.O. Box 191, 2802, Gjovik, Norway

    Einar Snekkenes

  2. Institute for Security in Distributed Applications, Hamburg University of Technology, 21071, Hamburg, Germany

    Dieter Gollmann

Rights and permissions

Reprints and Permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Serjantov, A., Sewell, P. (2003). Passive Attack Analysis for Connection-Based Anonymity Systems. In: Snekkenes, E., Gollmann, D. (eds) Computer Security – ESORICS 2003. ESORICS 2003. Lecture Notes in Computer Science, vol 2808. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39650-5_7

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-39650-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20300-1

  • Online ISBN: 978-3-540-39650-5

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Over 10 million scientific documents at your fingertips

Switch Edition
  • Academic Edition
  • Corporate Edition
  • Home
  • Impressum
  • Legal information
  • Privacy statement
  • California Privacy Statement
  • How we use cookies
  • Manage cookies/Do not sell my data
  • Accessibility
  • FAQ
  • Contact us
  • Affiliate program

Not logged in - 3.236.207.90

Not affiliated

Springer Nature

© 2023 Springer Nature Switzerland AG. Part of Springer Nature.