Slotted packet counting attacks on anonymity protocols

  • Authors:
  • Volker Fusenig;Eugen Staab;Uli Sorger;Thomas Engel

  • Affiliations:
  • University of Luxembourg, rue Richard Coudenhove-Kalergi, Luxembourg;University of Luxembourg, rue Richard Coudenhove-Kalergi, Luxembourg;University of Luxembourg, rue Richard Coudenhove-Kalergi, Luxembourg;University of Luxembourg, rue Richard Coudenhove-Kalergi, Luxembourg

  • Venue:
  • AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present a slotted packet counting attack against anonymity protocols. Common packet counting attacks make strong assumptions on the setup and can easily lead to wrong conclusions, as we will show in our work. To overcome these limitations, we account for the variation of traffic load over time. We use correlation to express the relation between sender and receiver nodes. Our attack is applicable to many anonymity protocols. It assumes a passive attacker and works with partial knowledge of the network traffic.