/
Cost to defeat the N-1 Attack Cost to defeat the N-1 Attack

Cost to defeat the N-1 Attack - PowerPoint Presentation

lindy-dunigan
lindy-dunigan . @lindy-dunigan
Follow
344 views
Uploaded On 2019-11-22

Cost to defeat the N-1 Attack - PPT Presentation

Cost to defeat the N1 Attack Neil Chettiar Plan Modify a pool mix to output nk messages for every n input messages MIX How costly is it Always maintain a pool of k dummy messages Use a random function to decide if the mix ID: 766861

messages mix attack dummy mix messages dummy attack traffic attacks mixes pool heartbeat counter time active set defeat triggered

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Cost to defeat the N-1 Attack" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Cost to defeat the N-1 Attack Neil Chettiar

Plan Modify a pool mix to output n+k messages for every n input messages. MIX

How costly is it? Always maintain a pool of k dummy messages. Use a random function to decide if the mix should or should not send out k dummy messages.Use Heartbeat traffic to check if an N-1 attack is in progress, use this information to weigh the decision.Set a Time-To-Live value for the dummy traffic.

Focus Points Does the strategy really beat the N-1 attack? How is the pool Mix triggered: OR/AND, Dynamic Threshold? Set limits of the number of dummy messages used. How expensive is it to use the Dummy messages?Cases when HeartBeat strategy gets wrongly triggered.Extreme situations when the proposed random function fails to defeat the N-1 attack.

Resources 1 . On blending attacks for mixes with Memory extended version. 2. Regroup-And-Go mixes to counter the (n-1) attack. 3. Active attacks on Reputable mix Networks. 4. Heartbeat traffic to counter (n-1) attacks. 5. A Least Squares approach to the static traffic analysis of high-latency anonymous communication systems. 6. Untraceable electronic mail, return addresses and digital pseudonyms. 7. From a trickle to a Flood: Active attacks on several Mix types. 8. Real-Time Mixes: A Bandwidth-Efficient anonymity protocol.

Questions?