Low latency anonymity systems are susceptive to traffic anal-ysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analysis attacks while providing a strict delay bound. The covering traffic generated by our scheme uses the minimum sending rate to provide full anonymity for a given set of flows. The relationship between user anonymity and the minimum covering traffic rate is then studied via analysis and simulation. When user flows are Poisson processes with the same sending rate, the minimum covering traffic rate to provide full anonymity to m users is O(logm). For Pareto traffic, we show that the rate of the covering traffic converges to a constant when the number of flows goes t...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks wh...
Existing IP anonymity systems tend to sacrifice one of low latency, high bandwidth, or resistance to...
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and ...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
We consider the problem of using artificially generated cover traffic to hide the network paths used...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
10.1145/1455770.1455812Proceedings of the ACM Conference on Computer and Communications Security323-...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
With an increasing amount of internet traffic becoming encrypted, traffic analysis attacks have beco...
We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous cl...
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at ...
An attacker can gain information of a user by analyzing its network traffic. The size of transferred...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks wh...
Existing IP anonymity systems tend to sacrifice one of low latency, high bandwidth, or resistance to...
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and ...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
We consider the problem of using artificially generated cover traffic to hide the network paths used...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
10.1145/1455770.1455812Proceedings of the ACM Conference on Computer and Communications Security323-...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
With an increasing amount of internet traffic becoming encrypted, traffic analysis attacks have beco...
We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous cl...
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at ...
An attacker can gain information of a user by analyzing its network traffic. The size of transferred...
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We ana...
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks wh...
Existing IP anonymity systems tend to sacrifice one of low latency, high bandwidth, or resistance to...