{"id":"https://openalex.org/W2138958700","doi":"https://doi.org/10.1109/dsn.2009.5270306","title":"On the effectiveness of low latency anonymous network in the presence of timing attack","display_name":"On the effectiveness of low latency anonymous network in the presence of timing attack","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2138958700","doi":"https://doi.org/10.1109/dsn.2009.5270306","mag":"2138958700"},"language":"en","primary_location":{"id":"doi:10.1109/dsn.2009.5270306","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2009.5270306","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE/IFIP International Conference on Dependable Systems &amp; Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107834526","display_name":"Jing Jin","orcid":"https://orcid.org/0000-0003-3293-7351"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jing Jin","raw_affiliation_strings":["Department of Computer Science, George Mason University, Fairfax, VA, USA","Department of Computer Science, George Mason University, Fairfax, VA 22030, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA 22030, USA#TAB#","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100634221","display_name":"Xinyuan Wang","orcid":"https://orcid.org/0009-0006-8330-342X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinyuan Wang","raw_affiliation_strings":["Department of Computer Science, George Mason University, Fairfax, VA, USA","Department of Computer Science, George Mason University, Fairfax, VA 22030, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA 22030, USA#TAB#","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5107834526"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.901,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.81708815,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"429","last_page":"438"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7506730556488037},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7239935398101807},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.6619470119476318},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5594200491905212},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4844551086425781},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4557473659515381},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.4450925588607788},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3830644190311432},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2673513889312744},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15367227792739868},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.09965485334396362},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06571531295776367}],"concepts":[{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7506730556488037},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7239935398101807},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.6619470119476318},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5594200491905212},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4844551086425781},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4557473659515381},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.4450925588607788},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3830644190311432},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2673513889312744},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15367227792739868},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.09965485334396362},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06571531295776367},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/dsn.2009.5270306","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2009.5270306","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE/IFIP International Conference on Dependable Systems &amp; Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.212.4709","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.212.4709","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ise.gmu.edu/~xwangc/Publications/DSN2009-Anonymity-CameraReady.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1484798037","https://openalex.org/W1538549779","https://openalex.org/W1567366855","https://openalex.org/W1590015132","https://openalex.org/W1590765731","https://openalex.org/W1591967853","https://openalex.org/W1847401883","https://openalex.org/W1869319442","https://openalex.org/W1916902331","https://openalex.org/W1978884755","https://openalex.org/W2005708967","https://openalex.org/W2040210405","https://openalex.org/W2043681328","https://openalex.org/W2065554061","https://openalex.org/W2102616700","https://openalex.org/W2103647628","https://openalex.org/W2109372411","https://openalex.org/W2109683670","https://openalex.org/W2123735079","https://openalex.org/W2127295197","https://openalex.org/W2146148058","https://openalex.org/W2151114655","https://openalex.org/W2162297215","https://openalex.org/W2163674653","https://openalex.org/W2166701378","https://openalex.org/W2168903388","https://openalex.org/W2169602770","https://openalex.org/W2169991041","https://openalex.org/W6628958682","https://openalex.org/W6635311569","https://openalex.org/W6635519262","https://openalex.org/W6640114481","https://openalex.org/W6682067062","https://openalex.org/W6683665485"],"related_works":["https://openalex.org/W1966494590","https://openalex.org/W1593132758","https://openalex.org/W2117874351","https://openalex.org/W4206398305","https://openalex.org/W3023934611","https://openalex.org/W2157186778","https://openalex.org/W2982648111","https://openalex.org/W2082747743","https://openalex.org/W1993929477","https://openalex.org/W2071573776"],"abstract_inverted_index":{"In":[0,189],"this":[1],"paper,":[2],"we":[3,110,191],"introduce":[4],"a":[5,32],"novel":[6,33],"metric":[7,28,149,156],"that":[8,81,91,163,194],"can":[9,82],"quantitatively":[10,83],"measure":[11,62,84],"the":[12,22,36,39,43,46,52,63,66,69,77,85,128,133,151,164,179,186],"practical":[13,79],"effectiveness":[14],"(i.e.":[15,199],"anonymity)":[16],"of":[17,24,35,38,65,71,181],"all":[18],"anonymous":[19,53,119],"networks":[20,120],"in":[21,167,205],"presence":[23],"timing":[25,41,87,114,129,152,159,176,183],"attack.":[26],"Our":[27,155],"is":[29,76],"based":[30,59],"on":[31,116],"measurement":[34],"distortion":[37,88],"packet":[40,86,103,207],"between":[42,89,146],"incoming":[44],"and":[45,50,55,125,150,158],"outgoing":[47],"flows":[48,90],"to":[49,61,175,185],"from":[51],"network":[54,169],"it":[56],"uses":[57],"wavelet":[58],"analysis":[60],"variability":[64],"distortion.":[67],"To":[68,105],"best":[70],"our":[72,74,107,138,147],"knowledge,":[73],"approach":[75],"first":[78],"method":[80],"may":[92],"have":[93,111,126,142,192],"gone":[94],"through":[95],"such":[96,121],"transformations":[97],"as":[98,122,132],"flow":[99],"mixing/spliting/merging,":[100],"adding":[101,195],"chaff,":[102],"dropping.":[104],"validate":[106],"anonymity":[108,139,148],"metric,":[109],"conducted":[112],"real-time":[113],"attacks":[115],"various":[117],"deployed":[118],"Tor,":[123],"anonymizer.com":[124],"used":[127],"attack":[130,153,160,177],"results":[131,161],"ground":[134],"truth":[135],"for":[136],"validating":[137],"metric.":[140],"We":[141],"found":[143,193],"strong":[144],"correlation":[145],"results.":[154],"measurements":[157],"show":[162],"circuit":[165],"rotation":[166],"Tor":[168],"could":[170],"significantly":[171],"increase":[172],"its":[173],"resistance":[174],"at":[178],"cost":[180],"more":[182],"disturbances":[184],"normal":[187],"users.":[188],"addition,":[190],"constant":[196],"rate":[197],"chaff":[198],"cover":[200],"traffic)":[201],"has":[202],"diminishing":[203],"effect":[204],"anonymizing":[206],"flows.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2013,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
