期刊文献+

一种基于停止-转发MIX的统计型攻击

Statistical Attack Based on Stop & Go MIX
下载PDF
导出
摘要 为了增强匿名系统的匿名性,更好地保护用户的通信隐私,基于停止-转发MIX提出一种新的统计型攻击算法.算法将攻击者的连续观察时间划分成t个周期,每个周期统计MIX节点输出信息包的接收者集合,称之为一个观察集合,获得t个观察集合后,采用概率统计、集合运算等方法,确定目标发送者的接收者集合.指出采用填充包技术防御该攻击时,可以增加攻击所需的观察集合数,降低攻击的有效性. In order to strengthen the anonymity degree of anonymity system, thus to protect users communication privacy more effective, this paper propose a new statistical attack algorithm based on stop- and - go MIX. The attack algorithm partitions the continuous observation time of an attacker into t cycles, statistics the receivers of the output packets of the MIX during each cycle, employs probability & statistics and set computation to deduce the receivers of the target sender. It points out that padding could be used to counter this attack, thus increases the observation sets of the attack and degrades the effectiveness of the attack.
出处 《小型微型计算机系统》 CSCD 北大核心 2010年第11期2217-2221,共5页 Journal of Chinese Computer Systems
基金 华南理工大学SRP项目资助 教育部博士点基金项目(200805610019)资助
关键词 数据隐私 网络安全 匿名系统 停止-转发MIX 统计型攻击 data privacy network security anonymity system Stop & Go MIX statistical attack
  • 相关文献

参考文献2

二级参考文献13

  • 1Gilbert H, Chasse G. A statistical attack of the feal-8 cryptosystem[J]. Computer Science,1991, 537:22-33. 被引量:1
  • 2Andre L, M dos Santos. Statistical attack against Virtual Banks[R]. Reliable Software Group,University of California, 2000. 被引量:2
  • 3Reiter M K, Rubin A D. Crowds:anonymity for web transactions[J]. ACM Transactions on Information and System Security, 1998,1(1):62-92. 被引量:2
  • 4Stefan Savage, David Wetherall, Anna Karlin , Tom Anderson. Practical network support for IP traceback[R]. Department of Computer Science and Engineering,University of Washington, Seattle. Technical Report UW-CSE-00-02-01 被引量:1
  • 5Micah Adler. Tradeoffs in probabilistic packet marking for IP traceback[D]. Department of Computer Science,University of Massachusetts, Amherst, November 9,2001. 被引量:2
  • 6Matsui M, Yamagishi A. Statistical attack on secret key cryptosystems[J]. Electronics and Communications in Japan Part Ⅲ-Fundamental Electronic Science, Sep. 1994, 77(9):61-72. 被引量:2
  • 7Chaum D.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88. 被引量:1
  • 8Serjantov A,Sewell P.Passive attack analysis for connection-based anonymity systems[C]//Proceedings of European Symposium on Research in Computer Security,2003-10:116-131. 被引量:1
  • 9Kedog an D,Agrawal D,Penz S.Limits of anonymity in open Environments[C]//Proceedings of Information Hiding Workshop (IH 2002),2002-10:53-69. 被引量:1
  • 10Danezis G.Better anonymous communications[D].University of Cambridge,2003-12. 被引量:1

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部