Traceback and Anonymity

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the buil...

Full description

Bibliographic Details
Main Authors: Wang, Xinyuan, Reeves, Douglas (Author)
Format: eBook
Language:English
Published: New York, NY Springer New York 2015, 2015
Edition:1st ed. 2015
Series:SpringerBriefs in Computer Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 01794nmm a2200277 u 4500
001 EB001085933
003 EBX01000000000000000845297
005 00000000000000.0
007 cr|||||||||||||||||||||
008 151215 ||| eng
020 |a 9781493934416 
100 1 |a Wang, Xinyuan 
245 0 0 |a Traceback and Anonymity  |h Elektronische Ressource  |c by Xinyuan Wang, Douglas Reeves 
250 |a 1st ed. 2015 
260 |a New York, NY  |b Springer New York  |c 2015, 2015 
300 |a VI, 80 p. 18 illus., 3 illus. in color  |b online resource 
653 |a Application software 
653 |a Computer and Information Systems Applications 
700 1 |a Reeves, Douglas  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a SpringerBriefs in Computer Science 
028 5 0 |a 10.1007/978-1-4939-3441-6 
856 4 0 |u https://doi.org/10.1007/978-1-4939-3441-6?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.3 
520 |a This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.   Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable