[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] a few fixes and notes
Update of /home/freehaven/cvsroot/doc/e2e-traffic
In directory moria.mit.edu:/home2/arma/work/freehaven/doc/e2e-traffic
Modified Files:
e2e-traffic.bib e2e-traffic.tex
Log Message:
a few fixes and notes
Index: e2e-traffic.bib
===================================================================
RCS file: /home/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.bib,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -d -r1.5 -r1.6
--- e2e-traffic.bib 22 Jan 2004 03:50:14 -0000 1.5
+++ e2e-traffic.bib 22 Jan 2004 04:34:46 -0000 1.6
@@ -78,7 +78,7 @@
year = {2003},
month = {March},
editor = {Roger Dingledine},
- publisher = {SprRinger-Verlag, LNCS 2760},
+ publisher = {Springer-Verlag, LNCS 2760},
www_ps_gz_url = {http://www.esat.kuleuven.ac.be/~cdiaz/papers/DS03.ps.gz},
}
Index: e2e-traffic.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.tex,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -d -r1.17 -r1.18
--- e2e-traffic.tex 22 Jan 2004 03:50:14 -0000 1.17
+++ e2e-traffic.tex 22 Jan 2004 04:34:46 -0000 1.18
@@ -731,10 +731,10 @@
\subsubsection{The original statistical disclosure attack}
%trial1
First, we simulated Danezis's original statistical disclosure attack,
-choosing different values for $N$ (the number of recipients), $m$ (the number
+varying the parameters $N$ (the number of recipients), $m$ (the number
of Alice's recipients), and $b$ (the batch size). The simulated ``Alice''
sends a single message every round to one of her recipients, chosen uniformly
-at random. The simulated background sends to $b-1$ addition recipients per
+at random. The simulated background sends to $b-1$ additional recipients per
round, also chosen uniformly at random. We ran 100 trial attacks for each
chosen $\left<N,m,b>\right>$ tuple. Each attack was set to halt when the
attacker had correctly identified Alice's recipients, or until 1,000,000
@@ -748,7 +748,7 @@
The next simulation examines the consequences of a more complex model for
background traffic, and of several related models for Alice's behavior.
-We model the background as a graph $N$ communicating parties, each of whom
+We model the background as a graph of $N$ communicating parties, each of whom
communicates with some of the others. We build this graph according to the
``scale-free'' model proposed in \cite{scale-emergence} and analyzed in
\cite{scale-analysis}, which shares desirable properties with ``small-world''
@@ -758,7 +758,9 @@
networks, including citations in journals, co-actors in IMDB, and links in
the WWW.
-%Should I include this?
+%Should I include this? -NM
+%If we run low on space, I would take out the first half of it, and
+% merge the second half with the above paragraph. -RD
The scale-free model works as follows: we begin with a small number of
interconnected vertices (in our case, 2). Then, we iteratively add vertices
to our graph, connecting each new vertex to every older vertex $i$ with
@@ -786,26 +788,26 @@
in the `background/background' (BB) model, not only are Alice's recipients
chosen according to their connectedness, but Alice also sends to them with
probability proportional to their connectedness. We selected these three
-models to examine the attack's effectiveness against users whose behavior was
-unrelated to other users' behavior (UU), users whose behavior was generated
-with the same model ather users' (BU), and users who mimiced the background
-distribution (BB).
+models to examine the attack's effectiveness against users whose behavior
+is unrelated to other users' behavior (UU), users whose behavior is
+generated with the same model as other users' (BU), and users who mimic
+the background distribution (BB).
(Describe results)
\subsubsection{Attacking pool mixes and mix-nets}
\label{subsec:sim-complex-mixes}
%trials 3,4
-Pooling slows an attacker by increasing the number of possible output
-messages corresponding to each input message. To simulate an attack against
+Pooling slows an attacker by increasing the number of output messages
+that can correspond to each input message. To simulate an attack against
pool mixes and mix-nets, we abstract away the actual pooling rule used by the
network, and instead assume that the network has reached a steady state, so
that each mix sends the same fraction of the messages in its pool every
round. We also assume that all senders choose paths of exactly the same
length.
-Unlike in the simulations above, `rounds' are now determined---not by a batch
-mix receiving a fixed number $b$ of messages---but by the passage of a fixed
+Unlike in the simulations above, `rounds' are now determined not by a batch
+mix receiving a fixed number $b$ of messages, but by the passage of a fixed
interval of time. Thus, the number of messages sent by the background is no
longer a fixed $b-n_a$ (where $n_a$ is the number of messages Alice sends),
but now follows a normal distribution with mean $B$ (and standard deviation
@@ -825,9 +827,10 @@
Several proposals exist for using dummy messages to frustrate traffic
analysis. Although several of them have been examined in the context of
low-latency systems \cite{defensive-dropping}, little work has been done to
-examine their effectiveness against long term intersection attacks.
+examine their effectiveness against long-term intersection attacks.
-First, we chose to restrict our examination (due to time limitations) to the
+%hm. tense switches between present and past. -rd
+First, we chose to restrict our examination (due to time constraints) to the
effects of dummy messages in several cases of the pool-mix/mix-net simulation
above. Because we are interested in learning how well dummies thwart
analysis, we chose cases where, in the absence of dummies, the attacker had
@@ -900,7 +903,7 @@
\section*{Acknowledgments}
%Thanks also to Gerald Britton, Geoffrey Goodell, Pete St. Onge, Peter
-%Palfrader, Al Riddoch Mike Taylor, and Dave Turner for letting us run our
+%Palfrader, Al Riddoch, Mike Taylor, and Dave Turner for letting us run our
%simulations on their computers.
%======================================================================
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/