[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] minor edits,



Update of /home/freehaven/cvsroot/doc/routing-zones
In directory moria.mit.edu:/tmp/cvs-serv2966

Modified Files:
	endpoint-tables.tex routing-zones.tex 
Log Message:
minor edits,
and a clarification added to the endpoints table in the appendix



Index: endpoint-tables.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/routing-zones/endpoint-tables.tex,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -d -r1.2 -r1.3
--- endpoint-tables.tex	28 Jan 2004 16:37:31 -0000	1.2
+++ endpoint-tables.tex	28 Jan 2004 19:12:15 -0000	1.3
@@ -29,5 +29,6 @@
 www.geocities.com & 26101  \\
 \end{tabular}
 \end{center}
-\end{small} 
-%%\end{table}
+{\em Note: } Web sites located in AS 3 were served from
+an Akamai node at MIT.  
+\end{small} %%\end{table}

Index: routing-zones.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/routing-zones/routing-zones.tex,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -d -r1.38 -r1.39
--- routing-zones.tex	28 Jan 2004 19:10:44 -0000	1.38
+++ routing-zones.tex	28 Jan 2004 19:12:15 -0000	1.39
@@ -199,9 +199,10 @@
 network~\cite{riot-remap}. Previous anonymity networks, such as Tarzan
 and Morphmix, aim to provide collusion resistance by comparing the IP of
 each peer~\cite{freedman:ccs02,morphmix:fc04} (our results show that
-this technique is ineffective). In this paper, {\em
-actual anonymity networks in the context of the properties of Internet
-routing at the AS-level} and design ways to quantify the results.
+this technique is ineffective). In this paper, we evaluate the
+topologies of {\em real anonymity networks in the context of the
+properties of Internet routing at the AS-level} and design ways to
+quantify the results.
 
 \subsection{Overview of Internet Routing and Topology}
 
@@ -569,11 +570,11 @@
 network, a DSL network, etc.) and that Bob is a content host located at
 a data hosting ISP.
 
-To generate a reasonable list of ASes senders might be
-located, we created a list DSL and cable modem providers from {\tt
+To generate a reasonable list of ASes where senders might be
+located, we created a list of DSL and cable modem providers from {\tt
 www.dslreports.com} that would be likely senders and mapped these
 providers to their respective AS numbers. To generate a list of typical
-receivers, we sample reasonable sites from comScore Media Metrix's ``Top
+receivers, we sampled sites from comScore Media Metrix's ``Top
 50 US Internet Properties'' from December 2003~\cite{www-comscore}, as
 well as sites that we think might be popular on anonymity networks.  The
 lists of senders and receivers that we used in our experiments are in
@@ -618,7 +619,7 @@
 %% Tor nodes, current Mixminion nodes, current Mixmaster nodes, and we
 %% can compare robustness of the network to zone-based attacks. 
 
-\subsection{Fundamental AS-level Properties of Mix Nodes and Paths}
+\subsection{Jurisdictional Independence of Mix Nodes and Paths}
 
 In this section, we explore the extent to which the nodes and paths are
 independent.  First, we analyze the ASes in which the mix nodes are
@@ -786,7 +787,7 @@
 more likely to result in the same hop being used twice along a single
 mix path, if this is not explicitly prevented.
 
-\subsection{Jurisdictional Attacks on Entry and Exit Paths}
+\subsection{Jurisdictional Independence of Entry and Exit Paths}
 
 \begin{table}[t]
 \begin{scriptsize} 

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/