{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:28Z","timestamp":1750308808061,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2009,10]]},"abstract":"<jats:p>We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks are based on the blind source separation algorithms widely used to recover individual signals from mixtures of signals in statistical signal processing. Since the philosophy behind the design of current anonymity networks is to mix traffic or to hide in crowds, the proposed anonymity attacks are very effective.<\/jats:p>\n          <jats:p>The flow separation attack proposed for wired anonymity networks can separate the traffic in a mix network. Our experiments show that this attack is effective and scalable. By combining the flow separation method with frequency spectrum matching, a passive attacker can derive the traffic map of the mix network. We use a nontrivial network to show that the combined attack works.<\/jats:p>\n          <jats:p>The proposed anonymity attacks for wireless networks can identify nodes in fully anonymized wireless networks using collections of very simple sensors. Based on a time series of counts of anonymous packets provided by the sensors, we estimate the number of nodes with the use of principal component analysis. We then proceed to separate the collected packet data into traffic flows that, with help of the spatial diversity in the available sensors, can be used to estimate the location of the wireless nodes. Our simulation experiments indicate that the estimators show high accuracy and high confidence for anonymized TCP traffic. Additional experiments indicate that the estimators perform very well in anonymous wireless networks that use traffic padding.<\/jats:p>","DOI":"10.1145\/1609956.1609964","type":"journal-article","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T18:28:31Z","timestamp":1257359311000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Compromising anonymous communication systems using blind source separation"],"prefix":"10.1145","volume":"13","author":[{"given":"Ye","family":"Zhu","sequence":"first","affiliation":[{"name":"Cleveland State University, Cleveland, OH"}]},{"given":"Riccardo","family":"Bettati","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX"}]}],"member":"320","published-online":{"date-parts":[[2009,11,6]]},"reference":[{"volume-title":"Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'00)","author":"Bahl P.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.554307"},{"volume-title":"Proceedings of the Privacy Enhancing Technologies Workshop (PET'02)","author":"Berthold O.","key":"e_1_2_1_3_1"},{"volume-title":"Proceedings of the Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Springer","author":"Berthold O.","key":"e_1_2_1_4_1"},{"volume-title":"Proceedings of Internation Conference on Wireless Networks (ICWN'05)","author":"Cai J.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.720250"},{"volume-title":"Proceedings of the 4th Symposium on Independent Component Analysis and Blind Signal Separation","author":"Cruces S.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Cuellar J. R. John B. Morris J. Mulligan D. K. Peterson J. and Polk J. M. 2004. RFC 3693: Geopriv requirements. http:\/\/www.ietf.org\/rfc\/rfc36-93.txt.  Cuellar J. R. John B. Morris J. Mulligan D. K. Peterson J. and Polk J. M. 2004. RFC 3693: Geopriv requirements. http:\/\/www.ietf.org\/rfc\/rfc36-93.txt.","DOI":"10.17487\/rfc3693"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_3"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. IEEE","author":"Danezis G.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_21"},{"volume-title":"Proceedings of Privacy Enhancing Technologies Workshop (PET'02)","author":"Diaz C.","key":"e_1_2_1_12_1"},{"volume-title":"Proceedings of the 13th USENIX Security Symposium. USENIX","author":"Dingledine R.","key":"e_1_2_1_13_1"},{"volume-title":"Proceedings of 17th International Conference on Computer Communications and Networks (ICCN'08)","author":"Dusi M.","key":"e_1_2_1_14_1"},{"volume-title":"Proceedings of the 1st IEEE Communications Society Conference on Sensor and ad Hoc Communications and Networks. IEEE","author":"Elnahrawy E.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/941326.941334"},{"volume-title":"Proceedings of the Network and Distributed Security Symposium (NDSS '96)","author":"G\u00fclc\u00fc C.","key":"e_1_2_1_18_1"},{"volume-title":"Proceedings of the GSPx and International Signal Processing Conference.","author":"Guvenc I.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.823988"},{"key":"e_1_2_1_21_1","unstructured":"Helsingius J. 1996. Press release: Johan Helsingius closes his Internet remailer. http:\/\/www.penet.fi\/press-english.html.  Helsingius J. 1996. Press release: Johan Helsingius closes his Internet remailer. http:\/\/www.penet.fi\/press-english.html."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505229"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020633503820"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.7.1483"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(91)90079-X"},{"volume-title":"Proceedings of the Information Hiding Workshop (IH'98)","author":"Kesdogan D.","key":"e_1_2_1_27_1"},{"volume-title":"Proceedings of the IEEE Military Communications Conference (MILCOM'03)","author":"Kong J.","key":"e_1_2_1_28_1"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778449"},{"volume-title":"Proceedings of the 8th International Conference on Financial Cryptography (FC'04)","author":"Levine B. N.","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.72.3634"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023727"},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Parekh S. 1996. Prospects for remailers\u2014where is anonymity heading on the internet. http:\/\/www._rstmonday.dk\/issues\/issue2\/remailers  Parekh S. 1996. Prospects for remailers\u2014where is anonymity heading on the internet. http:\/\/www._rstmonday.dk\/issues\/issue2\/remailers","DOI":"10.5210\/fm.v1i2.476"},{"volume-title":"Proceedings of the 6th European Signal Processing Conference (EUSIPCO'92)","author":"Pham D.-T.","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","unstructured":"Porras P. Saidi H. and Yegneswaran V. 2007. A multi-perspective analysis of the storm (peacomm) worm. Tech. rep. SRI International Computer Science Laboratory Menlo Park CA. http:\/\/www.cyber-ta.org\/pubs\/StormWorm\/.  Porras P. Saidi H. and Yegneswaran V. 2007. A multi-perspective analysis of the storm (peacomm) worm. Tech. rep. SRI International Computer Science Laboratory Menlo Park CA. http:\/\/www.cyber-ta.org\/pubs\/StormWorm\/."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371972"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"volume-title":"Proceedings of the Privacy Enhancing Technologies Workshop (PET'02)","author":"Serjantov A.","key":"e_1_2_1_39_1"},{"volume-title":"Proceedings of the Information Hiding Workshop (IH'02)","author":"Serjantov A.","key":"e_1_2_1_40_1"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. IEEE","author":"Sherwood R.","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/31.76486"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022630.1022640"},{"volume-title":"Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05)","year":"1940","author":"Zhang Y.","key":"e_1_2_1_44_1"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.21"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.94"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1609956.1609964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1609956.1609964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:14Z","timestamp":1750278374000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1609956.1609964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["10.1145\/1609956.1609964"],"URL":"https:\/\/doi.org\/10.1145\/1609956.1609964","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2009,10]]},"assertion":[{"value":"2007-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}