Delay normalization method of defending against timing-based attacks on anonymous communication systems

Chong Fu,Weizhong Qian,Mingyuan Zhao,Zhiguang Qin
DOI: https://doi.org/10.3969/j.issn.1001-0505.2009.04.017
2009-01-01
Abstract:To defend against the timing-based attacks on anonymous communication systems, a delay normalization method based on packets is proposed. This method normalizes all inter-packet intervals to a fixed value, and therefore prevents timing marks in the data stream by adjusting these intervals. The value can be defined through experience or a moving average method. When the inter-packet intervals in the data stream are less than the value, they are prolonged; when the inter-packet intervals are greater than the value, one or more chaff packets are inserted. Thus, all inter-packet intervals are the same and equal to the fixed value. The experimental results of defending against timing watermark attacks show that both the start time chosen by attackers and the intervals used to embed watermark can not influence the defensive effect of the method. The experimental results in the real network environment show that the average error rate of the timing watermark recognition reaches 43.51%, which proves that the proposed method is effective.
What problem does this paper attempt to address?