Meet the Family of Statistical Disclosure Attacks

10/16/2019
by   Simon Oya, et al.
0

Disclosure attacks aim at revealing communication patterns in anonymous communication systems, such as conversation partners or frequency. In this paper, we propose a framework to compare between the members of the statistical disclosure attack family. We compare different variants of the Statistical Disclosure Attack (SDA) in the literature, together with two new methods; as well as show their relation with the Least Squares Disclosure Attack (LSDA). We empirically explore the performance of the attacks with respect to the different parameters of the system. Our experiments show that i) our proposals considerably improve the state-of-the-art SDA and ii) confirm that LSDA outperforms the SDA family when the adversary has enough observations of the system.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/17/2019

A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems

Mixes, relaying routers that hide the relation between incoming and outg...
research
10/22/2019

Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks

High-latency anonymous communication systems prevent passive eavesdroppe...
research
01/20/2020

A Secure and Smart Framework for Preventing Ransomware Attack

Nowadays security is major concern for any user connected to the interne...
research
07/27/2021

Quantum Meet-in-the-Middle Attack on 7-round Feistel Construction

Quantum attacks on Feistel constructions have attracted much more attent...
research
05/11/2020

Threat modeling framework for mobile communication systems

Due to the complex nature of mobile communication systems, most of the s...
research
04/29/2020

Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks

We describe a new class of packet injection attacks called Man-on-the-Si...
research
02/20/2023

Efficient Algorithms for Boundary Defense with Heterogeneous Defenders

This paper studies the problem of defending (1D and 2D) boundaries again...

Please sign up or login with your details

Forgot password? Click here to reset