TY - BOOK AU - Wang,Xinyuan AU - Reeves,Douglas ED - SpringerLink (Online service) TI - Traceback and Anonymity T2 - SpringerBriefs in Computer Science, SN - 9781493934416 AV - QA76.76.A65 U1 - 004 23 PY - 2015/// CY - New York, NY PB - Springer New York, Imprint: Springer KW - Computer Science KW - Application software KW - Computer Applications N2 - This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.   Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable UR - http://dx.doi.org/10.1007/978-1-4939-3441-6 ER -