On Traffic Analysis in Anonymous Communication Networks PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download On Traffic Analysis in Anonymous Communication Networks PDF full book. Access full book title On Traffic Analysis in Anonymous Communication Networks by Ye Zhu. Download full books in PDF and EPUB format.

On Traffic Analysis in Anonymous Communication Networks

On Traffic Analysis in Anonymous Communication Networks PDF Author: Ye Zhu
Publisher:
ISBN:
Category :
Languages : en
Pages :

Book Description
In this dissertation, we address issues related to traffic analysis attacks and the engineering in anonymous communication networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures that can defeat various traffic analysis attacks. In this dissertation, we first focus on a particular class of traffic analysis attack, flow correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link at a mix with that over an output link of the same mix. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. We find that a mix with any known batching strategy may fail against flow correlation attacks in the sense that, for a given flow over an input link, the adversary can correctly determine which output link is used by the same flow. We theoretically analyze the effectiveness of a mix network under flow correlation attacks. We extend flow correlation attack to perform flow separation: The flow separation attack separates flow aggregates into either smaller aggregates or individual flows. We apply blind source separation techniques from statistical signal processing to separate the traffic in a mix network. Our experiments show that this attack is effective and scalable. By combining flow separation and frequency spectrum matching method, a passive attacker can get the traffic map of the mix network. We use a non-trivial network to show that the combined attack works. The second part of the dissertation focuses on engineering anonymous communication networks. Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. We propose a new measure for the anonymity degree, which takes into account possible heterogeneity. We model the effectiveness of single mixes or of mix networks in terms of information leakage and measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown.

On Traffic Analysis in Anonymous Communication Networks

On Traffic Analysis in Anonymous Communication Networks PDF Author: Ye Zhu
Publisher:
ISBN:
Category :
Languages : en
Pages :

Book Description
In this dissertation, we address issues related to traffic analysis attacks and the engineering in anonymous communication networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures that can defeat various traffic analysis attacks. In this dissertation, we first focus on a particular class of traffic analysis attack, flow correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link at a mix with that over an output link of the same mix. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. We find that a mix with any known batching strategy may fail against flow correlation attacks in the sense that, for a given flow over an input link, the adversary can correctly determine which output link is used by the same flow. We theoretically analyze the effectiveness of a mix network under flow correlation attacks. We extend flow correlation attack to perform flow separation: The flow separation attack separates flow aggregates into either smaller aggregates or individual flows. We apply blind source separation techniques from statistical signal processing to separate the traffic in a mix network. Our experiments show that this attack is effective and scalable. By combining flow separation and frequency spectrum matching method, a passive attacker can get the traffic map of the mix network. We use a non-trivial network to show that the combined attack works. The second part of the dissertation focuses on engineering anonymous communication networks. Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. We propose a new measure for the anonymity degree, which takes into account possible heterogeneity. We model the effectiveness of single mixes or of mix networks in terms of information leakage and measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown.

Traffic Monitoring and Analysis

Traffic Monitoring and Analysis PDF Author: Fabio Ricciato
Publisher: Springer
ISBN: 3642123651
Category : Computers
Languages : en
Pages : 207

Book Description
The Second International Workshop on Traffic Monitoring and Analysis (TMA 2010) was an initiative of the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks" (http:// www.tma-portal.eu/cost-tma-action). The COST program is an intergovernmental framework for European cooperation in science and technology, promoting the coordination of nationally funded research on a European level. Each COST Action aims at reducing the fragmentation in - search and opening the European research area to cooperation worldwide. Traffic monitoring and analysis (TMA) is nowadays an important research topic within the field of computer networks. It involves many research groups worldwide that are collectively advancing our understanding of the Internet. The importance of TMA research is motivated by the fact that modern packet n- works are highly complex and ever-evolving objects. Understanding, developing and managing such environments is difficult and expensive in practice. Traffic monitoring is a key methodology for understanding telecommunication technology and improving its operation, and the recent advances in this field suggest that evolved TMA-based techniques can play a key role in the operation of real networks.

Traffic Monitoring and Analysis

Traffic Monitoring and Analysis PDF Author: Antonio Pescapè
Publisher: Springer Science & Business Media
ISBN: 3642285333
Category : Computers
Languages : en
Pages : 184

Book Description
This book constitutes the proceedings of the 4th International Workshop on Traffic Monitoring and Analysis, TMA 2012, held in Vienna, Austria, in March 2012. The thoroughly refereed 10 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 31 submissions. The contributions are organized in topical sections on traffic analysis and characterization: new results and improved measurement techniques; measurement for QoS, security and service level agreements; and tools for network measurement and experimentation.

Data Traffic Monitoring and Analysis

Data Traffic Monitoring and Analysis PDF Author: Ernst Biersack
Publisher: Springer
ISBN: 3642367844
Category : Computers
Languages : en
Pages : 370

Book Description
This book was prepared as the Final Publication of COST Action IC0703 "Data Traffic Monitoring and Analysis: theory, techniques, tools and applications for the future networks". It contains 14 chapters which demonstrate the results, quality,and the impact of European research in the field of TMA in line with the scientific objective of the Action. The book is structured into three parts: network and topology measurement and modelling, traffic classification and anomaly detection, quality of experience.

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication PDF Author: Sambuddho Chakravarty
Publisher:
ISBN:
Category :
Languages : en
Pages :

Book Description
This generally involves correlating traffic entering and leaving the Tor network, linking otherwise unrelated connections. To increase the accuracy of identifying the victim connection among several connections, the adversary injects a traffic perturbation pattern into a connection arriving to the server from a Tor node, that the adversary wants to de-anonymize. One way to achieve this is by colluding with the server and injecting a traffic perturbation pattern using common traffic shaping tools. Our first attack involves a novel remote bandwidth estimation technique to conrm the identity of Tor relays and network routers along the path connecting a Tor client and a server by observing network bandwidth fluctuations deliberately injected by the server. The second attack involves correlating network statistics, for connections entering and leaving the Tor network, available from existing network infrastructure, such as Cisco's NetFlow, for identifying the source of an anonymous connection.

Traffic Monitoring and Analysis

Traffic Monitoring and Analysis PDF Author: Jordi Domingo-Pascual
Publisher: Springer Science & Business Media
ISBN: 3642203043
Category : Business & Economics
Languages : en
Pages : 207

Book Description
This book constitutes the proceedings of the Third International Workshop on Traffic Monitoring and Analysis, TMA 2011, held in Vienna, Austria, on April 27, 2011 - co-located with EW 2011, the 17th European Wireless Conference. The workshop is an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks". The 10 revised full papers and 6 poster papers presented together with 4 short papers were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on traffic analysis, applications and privacy, traffic classification, and a poster session.

Traffic Monitoring and Analysis

Traffic Monitoring and Analysis PDF Author: Maria Papadopouli
Publisher: Springer
ISBN: 3642016456
Category : Computers
Languages : en
Pages : 144

Book Description
The First International Workshop on Traffic Monitoring and Analysis (TMA 2009) was an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks" (www.cost-tma.eu). The COST program is an intergovernmental framework for European Cooperation in Science and Technology, allowing the coordination of nationally funded research on a European level. Each COST Action contributes to reducing the fragmentation in research and opening the European Research Area to cooperation worldwide. Traffic monitoring and analysis (TMA) is now an important research topic within the field of networking. It involves many research groups worldwide that are coll- tively advancing our understanding of the Internet. The importance of TMA research is motivated by the fact that modern packet n- works are highly complex and ever-evolving objects. Understanding, developing and managing such environments is difficult and expensive in practice. Traffic monitoring is a key methodology for understanding telecommunication technology and improving its operation, and the recent advances in this field suggest that evolved TMA-based techniques can play a key role in the operation of real networks. Moreover, TMA offers a basis for prevention and response in network security, as typically the det- tion of attacks and intrusions requires the analysis of detailed traffic records. On the more theoretical side, TMA is an attractive research topic for many reasons.

Traffic Analysis, Performance Evaluation and Enhancement in Modern Data Communication Networks

Traffic Analysis, Performance Evaluation and Enhancement in Modern Data Communication Networks PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 158

Book Description
Traffic characteristics, which include both short range and long range characteristics, are one of the most important factors that affect the performance of modern data communication networks. Although during the last few years, significant research results have been proposed on models that capture long range dependency in traffic and its impact on Internet performance, they are inadequate for predicting queuing processes, delays and loss rates under dedicated scheduling disciplines or within specific network systems such as optical networks and wireless networks. This work first carries out traffic characteristic studies in communication networks with specific system details. The network systems under study include general communication networks with specific scheduling discipline--Generalized Processor Sharing (GPS), high-speed optical networks with Optical Burst Switching (OBS) paradigm and data intensive wireless cellular networks. Together with traffic characteristic studies, congestion control (using, e.g., TCP, rate assignment or control) is another important factor affecting the network performance, which is studied in this work. In particular, we consider a bufferless network core (as in the case of optical networks) and study how to improve the performance of TCP by enhancing its congestion mechanism. In addition, we investigate how to take advantage of the knowledge of data traffic characteristics to improve rate control and admission control mechanisms in wireless cellular networks. We aim at a comprehensive approach to studying traffic characteristics and enhancing the performance of congestion control mechanisms in different network systems. We develop traffic models and algorithms taking into consideration of network specifics such as schedule disciplines, transmission mechanisms, buffer availability and wireless channel conditions involved. The obtained results and implementations are evaluated analytically and via examples and simulations.

Traffic Monitoring and Analysis

Traffic Monitoring and Analysis PDF Author: Fabio Ricciato
Publisher:
ISBN: 9783642123665
Category :
Languages : en
Pages : 212

Book Description


An Analysis of Routing Strategies for Traffic Restoration in Wide Area Communication Networks

An Analysis of Routing Strategies for Traffic Restoration in Wide Area Communication Networks PDF Author: Krishnan Balakrishnan
Publisher:
ISBN:
Category :
Languages : en
Pages : 208

Book Description