Sampled Traffic Analysis by Internet-Exchange-Level Adversaries

@inproceedings{Murdoch2007SampledTA,
  title={Sampled Traffic Analysis by Internet-Exchange-Level Adversaries},
  author={Steven J. Murdoch and Piotr Zielinski},
  booktitle={Privacy Enhancing Technologies},
  year={2007}
}
Existing low-latency anonymity networks are vulnerable to traffic analysis, so location diversity of nodes is essential to defend against attacks. Previous work has shown that simply ensuring geographical diversity of nodes does not resist, and in some cases exacerbates, the risk of traffic analysis by ISPs. Ensuring high autonomous-system (AS) diversity can resist this weakness. However, ISPs commonly connect to many other ISPs in a single location, known as an Internet eXchange (IX). This… CONTINUE READING
Highly Influential
This paper has highly influenced 17 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 199 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
134 Citations
20 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 134 extracted citations

200 Citations

0102030'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 200 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 20 references

LINX news

  • M. Hughes
  • http://www.uknof.org.uk/uknof4/Hughes-LINX.pdf
  • 2006
1 Excerpt

sFlow – I can feel your traffic

  • E. Jasinska
  • 23C3: 23rd Chaos Communication Congress.
  • 2006
1 Excerpt

spamHINTS project (2006) http://www.spamhints.org

  • R. Clayton
  • 2006
1 Excerpt

Similar Papers

Loading similar papers…