[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] tweaks on secs 1 and 2



Update of /home/freehaven/cvsroot/doc/routing-zones
In directory moria.mit.edu:/home2/arma/work/freehaven/doc/routing-zones

Modified Files:
	routing-zones.bib routing-zones.tex 
Log Message:
tweaks on secs 1 and 2


Index: routing-zones.bib
===================================================================
RCS file: /home/freehaven/cvsroot/doc/routing-zones/routing-zones.bib,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -d -r1.15 -r1.16
--- routing-zones.bib	28 Jan 2004 19:10:44 -0000	1.15
+++ routing-zones.bib	28 Jan 2004 19:46:59 -0000	1.16
@@ -4,6 +4,24 @@
   note = {\url{http://www.palfrader.org/echolot/}},
 }
 
+@Misc{anonymizer,
+  key =          {anonymizer},
+  title =        {The {Anonymizer}},
+  note =         {\url{http://anonymizer.com/}}
+}
+
+@InProceedings{web-mix,
+   author =      {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
+   title =       {Web {MIX}es: A system for anonymous and unobservable
+                  {I}nternet access}, 
+  booktitle =    {Designing Privacy Enhancing Technologies: Workshop
+                  on Design Issue in Anonymity and Unobservability},
+   editor =       {H. Federrath},
+   publisher =    {Springer-Verlag, LNCS 2009},
+   pages =       {115--129},
+   year =        {2000},
+}
+
 @techreport{freedom21-security,
   title = {Freedom Systems 2.1 Security Issues and Analysis}, 
   author = {Adam Back and Ian Goldberg and Adam Shostack}, 
@@ -292,7 +310,7 @@
 
 @Misc{www-comscore,
   key = 	 {comscore},
-  Title = 	 {comScore Media Metrix Announces Top 50 U.S. Internet Property Rankings for December 2003},
+  Title = 	 {{comScore Media Metrix Announces Top 50 U.S. Internet Property Rankings for December 2003}},
   howpublished = {\url{http://www.comscore.com/press/release.asp?press=402}},
   month = 	 {January 14, },
   year = 	 {2004},

Index: routing-zones.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/routing-zones/routing-zones.tex,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -d -r1.39 -r1.40
--- routing-zones.tex	28 Jan 2004 19:12:15 -0000	1.39
+++ routing-zones.tex	28 Jan 2004 19:46:59 -0000	1.40
@@ -138,14 +138,12 @@
 random node selection are likely to be observed by a single AS between
 10\% and 30\% of the time, depending on the location of the initiator
 and responder, and that the single AS that can observe these paths is
-always a backbone ISP.  We conclude that with a small change in the node
-selection algorithm, users of these networks can minimize the likelihood
-that their entry path and exit path traverse the same AS.
+always a backbone ISP.  We conclude that a slightly different node
+selection algorithm can allow users of these networks to minimize the
+likelihood that their entry path and exit path traverse the same AS.
 
 \section{Background}
 
-%we provide necessary background information on
-%anonymizing networks and on Internet routing.
 We first describe the different types of mix networks and present a brief
 explanation of the types of attacks that each type of mix network must
 protect against.  Because we argue that designers of mix networks
@@ -163,22 +161,25 @@
 toward their destinations.
 
 Subsequent anonymity systems have diverged in two directions. Systems
-like Babel~\cite{babel}, Mixmaster~\cite{mixmaster-spec}, and
+like Babel~\cite{babel}, Mixmaster, and
 Mixminion~\cite{minion-design} aim to defend against powerful adversaries,
 but at
 the cost of requiring high and variable latency. Other systems, such as
-Onion Routing or its successor Tor~\cite{tor-design,or-jsac98} and the
+Onion Routing, its successor Tor, and the
 Freedom network~\cite{freedom2-arch}, support
 low-latency transactions such as web browsing, but necessarily have a
-weaker threat model.
+weaker threat model. Onion Routing and Freedom differ from single-hop
+proxies like the Anonymizer~\cite{anonymizer} or fixed-path topologies
+like Web Mixes~\cite{web-mix} in that they aim to achieve as much
+diversity in node placement and path selection as possible.
 
 Anonymity networks aim to protect against a wide variety of both passive
 and active attacks~\cite{back01,raymond00}. Such attacks generally
 fall into two categories: attacks inside the network and endpoint
 attacks. Attacks inside the network aim to partition anonymity sets
 through passive observation~\cite{disad-free-routes,minion-design}
-or active traffic manipulation~\cite{trickle02}, or otherwise reduce
-the set of suspects for a given transaction. Endpoint attacks treat the
+or active traffic manipulation~\cite{trickle02}, or otherwise narrow
+out suspects for a given transaction. Endpoint attacks treat the
 network as a black box and consider only the entry node and exit node
 for the transaction; such attacks include simple timing and counting
 attacks against low-latency systems~\cite{defensive-dropping,SS03},
@@ -201,7 +202,7 @@
 each peer~\cite{freedman:ccs02,morphmix:fc04} (our results show that
 this technique is ineffective). In this paper, we evaluate the
 topologies of {\em real anonymity networks in the context of the
-properties of Internet routing at the AS-level} and design ways to
+properties of Internet routing at the AS-level}, and design ways to
 quantify the results.
 
 \subsection{Overview of Internet Routing and Topology}
@@ -210,7 +211,7 @@
 of a mix network, we must first understand how packets are routed
 between two arbitrary hosts on the Internet.  In this section, we first
 present a brief overview of interdomain routing (i.e., routing between
-ISPs) on the Internet. We then describe available data on Internet
+ISPs) on the Internet, and then describe available data on Internet
 topologies and our assumptions regarding how well this data reflects the
 paths that packets actually travel.
 
@@ -404,7 +405,7 @@
 \label{sec:path-selection}
 
 To build a path in an anonymity network, clients must somehow discover a set
-of currently available nodes. In Mixmaster, clients examine the output
+of current nodes. In Mixmaster, clients examine the output
 of ``pinger'' software that measures node reliability and publishes keys
 and addresses for each remailer~\cite{echolot}. In Tor, clients download
 a similar network snapshot from special nodes called directory
@@ -415,8 +416,8 @@
 from this node (some operators choose instead to be \emph{middleman} nodes,
 to avoid needing to deal with abuse complaints.)
 
-We abstract the details of fetching this list: assume Alice ends up
-with a set $N$ of possible choices, of which $E \subseteq N$ are exit nodes.
+We abstract how Alice gets the list: assume she has
+a set $N$ of possible choices, of which $E \subseteq N$ are exit nodes.
 Also assume that all nodes in the network are listed as working (typically
 some nodes are listed as temporarily offline).
 

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/