The University of Southampton
University of Southampton Institutional Repository

Minimising anonymity loss in anonymity networks under DoS attacks

Minimising anonymity loss in anonymity networks under DoS attacks
Minimising anonymity loss in anonymity networks under DoS attacks
Anonymity is a security property of paramount importance as it helps to protect users’ privacy by ensuring that their identity remains unknown. Anonymity protocols generally suffer from denial of service (DoS) attack, as repeated message retransmission affords more opportunities for attackers to analyse traffic and lower the protocols’ privacy. In this paper, we analyse how users can minimise their anonymity loss under DoS attacks by choosing to remove or keep ‘failed’ nodes from router lists. We also investigate the strategy effectiveness in those cases where users cannot decide whether the ‘failed’ node are the targets of DoS attacks.
414-429
Yang, Mu
5b63ff7c-7560-423e-ac2c-e8e19396da7c
Sassone, Vladimiro
df7d3c83-2aa0-4571-be94-9473b07b03e7
Yang, Mu
5b63ff7c-7560-423e-ac2c-e8e19396da7c
Sassone, Vladimiro
df7d3c83-2aa0-4571-be94-9473b07b03e7

Yang, Mu and Sassone, Vladimiro (2011) Minimising anonymity loss in anonymity networks under DoS attacks. In: 13th International Conference on Information and Communications Security, 23rd-26th, Nov, 2011, Beijing, China. Lecture Notes in Computer Science, 7043, 414-429.

Record type: Article

Abstract

Anonymity is a security property of paramount importance as it helps to protect users’ privacy by ensuring that their identity remains unknown. Anonymity protocols generally suffer from denial of service (DoS) attack, as repeated message retransmission affords more opportunities for attackers to analyse traffic and lower the protocols’ privacy. In this paper, we analyse how users can minimise their anonymity loss under DoS attacks by choosing to remove or keep ‘failed’ nodes from router lists. We also investigate the strategy effectiveness in those cases where users cannot decide whether the ‘failed’ node are the targets of DoS attacks.

Text
fulltext.pdf - Version of Record
Download (411kB)

More information

Published date: 23 November 2011
Venue - Dates: Proceedings of the 13th international conference on Information and communications security, Lecture Notes in Computer Science, 2011-11-23
Organisations: Web & Internet Science

Identifiers

Local EPrints ID: 273078
URI: http://eprints.soton.ac.uk/id/eprint/273078
PURE UUID: 5a912204-51a9-48a1-8a6a-2d97be8bcc46
ORCID for Vladimiro Sassone: ORCID iD orcid.org/0000-0002-6432-1482

Catalogue record

Date deposited: 29 Dec 2011 09:49
Last modified: 10 Sep 2024 01:40

Export record

Contributors

Author: Mu Yang
Author: Vladimiro Sassone ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×