{"title":"基于池混合的匿名通信系统中用户分析的最小二乘方法","authors":"F. Pérez-González, C. Troncoso","doi":"10.1109/WIFS.2012.6412635","DOIUrl":null,"url":null,"abstract":"Deployed high-latency anonymous communication systems conceal communication patterns using pool mixes as building blocks. These mixes are known to be vulnerable to Disclosure Attacks that uncover persistent relationships between users. In this paper we study the performance of the Least Squares Disclosure Attack (LSDA), an approach to disclosure rooted in Maximum Likelihood parameter estimation that recovers user profiles with greater accuracy than previous work. We derive analytical expressions that characterize the profiling error of the LSDA with respect to the system parameters for a threshold binomial pool mix and validate them empirically. Moreover, we show that our approach is easily adaptable to attack diverse pool mixing strategies.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A Least Squares approach to user profiling in pool mix-based anonymous communication systems\",\"authors\":\"F. Pérez-González, C. Troncoso\",\"doi\":\"10.1109/WIFS.2012.6412635\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Deployed high-latency anonymous communication systems conceal communication patterns using pool mixes as building blocks. These mixes are known to be vulnerable to Disclosure Attacks that uncover persistent relationships between users. In this paper we study the performance of the Least Squares Disclosure Attack (LSDA), an approach to disclosure rooted in Maximum Likelihood parameter estimation that recovers user profiles with greater accuracy than previous work. We derive analytical expressions that characterize the profiling error of the LSDA with respect to the system parameters for a threshold binomial pool mix and validate them empirically. Moreover, we show that our approach is easily adaptable to attack diverse pool mixing strategies.\",\"PeriodicalId\":396789,\"journal\":{\"name\":\"2012 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WIFS.2012.6412635\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS.2012.6412635","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Least Squares approach to user profiling in pool mix-based anonymous communication systems
Deployed high-latency anonymous communication systems conceal communication patterns using pool mixes as building blocks. These mixes are known to be vulnerable to Disclosure Attacks that uncover persistent relationships between users. In this paper we study the performance of the Least Squares Disclosure Attack (LSDA), an approach to disclosure rooted in Maximum Likelihood parameter estimation that recovers user profiles with greater accuracy than previous work. We derive analytical expressions that characterize the profiling error of the LSDA with respect to the system parameters for a threshold binomial pool mix and validate them empirically. Moreover, we show that our approach is easily adaptable to attack diverse pool mixing strategies.