[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] Tighten conclusion; hunt more orphans
Update of /home/freehaven/cvsroot/doc/e2e-traffic
In directory moria.mit.edu:/tmp/cvs-serv26553
Modified Files:
e2e-traffic.tex
Log Message:
Tighten conclusion; hunt more orphans
Index: e2e-traffic.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.tex,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -d -r1.47 -r1.48
--- e2e-traffic.tex 2 May 2004 22:23:49 -0000 1.47
+++ e2e-traffic.tex 2 May 2004 22:40:20 -0000 1.48
@@ -148,8 +148,8 @@
The attacks in this paper fail to work when:
\begin{tightlist}
\item Alice's behavior is not consistent over time. If Alice does not
- produce enough traffic with the same group of regular recipients,
- the attacker cannot learn Alice's behavior.
+ produce enough traffic with the same recipients,
+ the attacker cannot learn her behavior.
%%We will quantify what `enough' means below.
% if it's true that we will, we should probably shout it louder
% in the abstract. guess we'll wait to see if we do. -RD
@@ -592,10 +592,10 @@
On the other hand, if Alice's behavior $\V{v}$ remains consistent
while the behavior of the background traffic $\V{u}$ changes slowly, the
attacker still has some hope. Rather than estimating a single $\B{U}$
-from observations to which Alice does not contribute, the attacker
+from rounds to which Alice does not contribute, the attacker
estimates a series of successive $\B{U_i}$ values based on the
average behavior of the network during comparatively shorter
-durations of time. Now the attacker observes $\V{o_i}$ as before and
+durations of time. The attacker observes $\V{o_i}$ and
computes the average of $\V{o_i} - \B{U_i}$, as before. Now,
\[ \V{v} \propto \frac{1}{t}\sum_{i=1}^t \V{o_i} - \B{U_i}
\]
@@ -642,11 +642,11 @@
messages in the same class are likelier to come from the same sender than two
messages chosen at random.
-The easiest scenario for partitioning is pseudonymity: in a typical
+For example, in a typical
pseudonym service, each sender has one or more pseudonyms and each
delivered messages is associated with a pseudonym.
To link senders and recipients, an attacker only needs to link senders to
-their pseudonyms. To do so, he can treat
+their pseudonyms. He can do so by treating
pseudonyms as virtual message
destinations: instead of collecting observations $\V{o_i}$ of
recipients who receive messages in round $i$, the attacker now
@@ -1021,10 +1021,9 @@
%intersection attacks can be considered a closed problem.
Our model differs most from reality in four ways: First, real user behavior
is more complex than we have assumed. Second, user behavior changes over
-time. Third, real messages often exhibit full or partial linkability (as
-described in section~\ref{subsec:strenghtening}), which we have not
-simulated. Fourth, real attackers are not limited to passive observation.
-We each of these points before.
+time. Third, real messages often exhibit full or partial linkability, which
+we have not simulated. Fourth, real attackers are not limited to passive
+observation. We consider each of these points below.
% These need to get re-ordered. -NM
Although real social networks behave more like scale-free networks than like
@@ -1089,26 +1088,24 @@
\subsubsection{Implications for mix network design:}
%\label{subsubsec:implications}
-If we were to design a mix network based on our findings here, what steps
-should we take to frustrate intersection attack?
+What steps
+should mix-net designers take to frustrate intersection attacks?
-The first lesson is this: {\bf high variability} in message delays is
-essential. By `spreading' the effects of each incoming message over several
-output rounds, variability in delay increases each message's anonymity set, and
-amplifies the effect of padding.
+First, {\bf high variability} in message delays is essential. By `spreading'
+the effects of each incoming message over several output rounds, variability
+in delay increases each message's anonymity set, and amplifies the effect of
+padding.
{\bf Padding} seems to slow traffic analysis, especially when the padding is
consistent enough to prevent the attacker from gaining a picture of the
network in Alice's absence. On the other hand, significant padding volumes
may be too cumbersome for most users, and perfect consistency (sending
-padding messages from the moment a network goes online to the moment it shuts
+padding from the moment a network goes online until it shuts
down) is similarly difficult.
-Users should be educated about the effects of their chosen {\bf message
-volume}: sending infrequently is safe, especially if the user doesn't
-repeat the same traffic pattern long enough for the attacker to identify
-it. Conversely, sending ``almost always'' is comparatively safe.
-But users in between appear vulnerable to intersection attacks.
+Users should be educated about the effects of {\bf message volume}: sending
+infrequently is relatively safe, especially if the user doesn't repeat the
+same traffic pattern for long.
%The threat of non-global observers must not be ignored.
Mix networks should take steps to {\bf minimize the proportion of observed
@@ -1136,7 +1133,6 @@
towards quantification of risk for given parameters of
adversaries, senders, and mixes.
-
% We said that fixed entry/exit might help too, but I now think it
% wouldn't. Suppose the attacker observes c nodes out of n. If I
% choose random paths, the attacker sees (c/n)^2 of my traffic with
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/