1887

n South African Computer Journal - Exposing anonymous network participants via an external attack : reviewed article

USD

 

Abstract

This paper presents an attack on anonymity networks. The nature of the attack is one which falls into a category that has received little attention in the field of anonymity: an external attack. External attacks on anonymity networks maybe more useful in the near future as anonymity networks are used more and more for abusive / fraudulent purposes, for example, in the case of click fraud. The attack presented relies on two principles. The first principle is the unlikelihood of a sender representing himself in an anonymity network and the second principle is that of recognising relating requests from an anonymous network. The anonymity model used for the attack in this paper is that of crowds. Crowds is an eligible candidate for attack since it satisfies the two principles required for the attack. An example is presented in which we discuss the details of the attack. We then present and discuss the results of a simulated attack (using much larger numbers) conducted against crowds.

Loading

Article metrics loading...

/content/comp/2006/37/EJC28025
2006-12-01
2016-12-09
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error