We apply blind source separation techniques from statistical signal processing to separate the traffic in a mix network. Our experiments show that this attack is effective and scalable. By combining the flow separation method and frequency spectrum matching method, a passive attacker can get the traffic map of the mix network. We use a non-trivial network to show that the combined attack works. The experiments also show that multicast traffic can be dangerous for anonymity networks. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Zhu, Y., & Bettati, R. (2006). Unmixing mix traffic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3856 LNCS, pp. 110–127). Springer Verlag. https://doi.org/10.1007/11767831_8
Mendeley helps you to discover research relevant for your work.