Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama's Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity of new surveillance technologies in cyberspace enables instant, undetectable, and unsolicited information collection about entities. Hence, anonymity and privacy are becoming increasingly important issues. Anonymization enables entities to protect their data and systems from a diverse set of cyber attacks and preserves privacy.However, communication anonymity is degraded since the attacker is able to exclude receivers D and F. In this case, the AS is the set of sender- receiver pairs (AS=SxR). For mobile networks, the additional anonymity property of locationanbsp;...
|Title||:||A Taxonomy for and Analysis of Anonymous Communications Networks|
|Author||:||Douglas J. Kelly|
|Publisher||:||ProQuest - 2009|