Practical traffic analysis: extending and resisting statistical disclosure

  • Authors:
  • Nick Mathewson;Roger Dingledine

  • Affiliations:
  • The Free Haven Project;The Free Haven Project

  • Venue:
  • PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis attacks against anonymous message systems, by describing how an eavesdropper can learn sender-receiver connections even when the substrate is a network of pool mixes, the attacker is non-global, and senders have complex behavior or generate padding messages. Additionally, we describe how an attacker can use information about message distinguishability to speed the attack. We simulate our attacks for a variety of scenarios, focusing on the amount of information needed to link senders to their recipients. In each scenario, we show that the intersection attack is slowed but still succeeds against a steady-state mix network. We find that the attack takes an impractical amount of time when message delivery times are highly variable; when the attacker can observe very little of the network; and when users pad consistently and the adversary does not know how the network behaves in their absence.