[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Question about the real traffic pattern to Tor nodes
- To: or-talk@xxxxxxxxxxxxx
- Subject: Question about the real traffic pattern to Tor nodes
- From: Stone <snifferpro@xxxxxxxxx>
- Date: Thu, 23 Jun 2005 21:41:54 +0800
- Delivered-to: archiver@seul.org
- Delivered-to: or-talk-outgoing@seul.org
- Delivered-to: or-talk@seul.org
- Delivery-date: Thu, 23 Jun 2005 09:42:07 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=Y3mvgfOeyb+WnSgsymlb6pFX8Kem2xCAO/tuQSGvwPOfGq1Ln/7UvhNQjZWU+b/hH9OBSzpxPTf0SBSWUSjmFV5/lElXsmBoD9Kbwv38Cu0ao/M8XlENcmTLnTuehj/hc83EGNKZvf4oUqGIVvNhgA2WWl1kswViINkysuL4BMc=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
In the paper of Stop-and-Go mix, Kesdogan et al. assume that the
incoming traffic pattern can be approximated by a Poisson process. And
this assumption is also adopted by Diaz in the paper of "Towards
measuring Anonymity". But she questioned the assumption and in her
later paper "Comparison between two practical mix designs", she
concluded that the traffic pattern is highly unpredictable and is not
as commonly assumed in the literature. The conclusion is drawn by
examining the four months of real incoming traffic to a working
Mixmaster node.
But I wonder that is the traffic pattern to Tor nodes or those in
low-latency system the same as that in high-latency anonymous system
such as Mixmaster. I think this result is helpful when analyzing the
properties of a mix( e.g. average time delayed before flushing, the
probability of n-1 attack,etc). So Has anyone made efforts to prove
the traffic pattern in the Tor networks? Is the traffic pattern the
same as is examined in the low-latency network? Or can anyone help
collect some real input to examine it? Thank you!