Analyzing anonymity in cyberspace

被引:0
作者
Kelly, Douglas [1 ]
Raines, Richard [1 ]
Baldwin, Rusty [1 ]
Mullins, Barry [1 ]
Grimaila, Michael [1 ]
机构
[1] USAF, Inst Technol, Wright Patterson AFB, OH 45433 USA
来源
3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS | 2008年
关键词
anonymity; metrics; communications networks; cyberspace;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For any organization interested in securing anonymity in cyberspace, the ability to understand changes in anonymity levels during a cyber attack is crucial. To achieve anonymity actions should be separated from the agents who perform them, for some adversary. Anonymity in general as well as the anonymity of each particular agent or group is dependent upon several factors. Thus, numerous methods of analyzing anonymity in cyberspace exist. Typical approaches use simple quantifications and basic probabilistic models. This paper explores a variety of anonymity metrics. Practical applications of the metrics reveal how anonymity is defined and quantified in cyberspace. The objective is to provide a macro-level view of the systematic analysis of anonymity preservation, degradation, or elimination in existing and proposed wired and wireless anonymous communications networks.
引用
收藏
页码:221 / 232
页数:12
相关论文
共 43 条
[1]  
BOUKERCHE A, 29 ANN IEEE INT C LO, P618
[2]  
Boyan J., 1997, CMC MAGAZINE
[3]  
CHATZIKOKOLAKIS K, 2007, S TRUSTW GLOB COMP
[4]  
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
[5]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[6]  
COTTRELL L, 2001, MIXMASTER PROTOCOL V
[7]  
CUZZOLIN F, 2005, THEORY EVIDENCE
[8]  
DAI W, 1998, PIPENET 1 1
[9]  
DANEZIS G, 2003, IEEE S SEC PRIV SP
[10]  
DIAZ C, PRIV ENH TECHN WORKS