About this book
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.
Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
- Book Title Traceback and Anonymity
- Series Title SpringerBriefs in Computer Science
- Series Abbreviated Title SpringerBriefs Computer Sci.
- DOI https://doi.org/10.1007/978-1-4939-3441-6
- Copyright Information The Author(s) 2015
- Publisher Name Springer, New York, NY
- eBook Packages Computer Science Computer Science (R0)
- Softcover ISBN 978-1-4939-3439-3
- eBook ISBN 978-1-4939-3441-6
- Series ISSN 2191-5768
- Series E-ISSN 2191-5776
- Edition Number 1
- Number of Pages VI, 80
- Number of Illustrations 15 b/w illustrations, 3 illustrations in colour
- Buy this book on publisher's site