0

Alice and Bob are communicating frequently via an encrypted overlay network. Eve can observe the timing and length of Alice's and Bob's incoming and outgoing ip traffic, but cannot read their ciphertexts. Additionally, the overlay network prevents Eve from determining who the traffic's remote transceiver is. With an adequate number of observations, Eve can show, statistically, that Alice and Bob are communicating. Is there a specific name for what Eve is doing?

nobody
  • 11,251
  • 1
  • 41
  • 60
Brent
  • 105
  • 2

1 Answers1

-1

This is commonly described as a traffic analysis attack.

nobody
  • 11,251
  • 1
  • 41
  • 60