Active timing based techniques for attack attribution through stepping stones
暂无分享,去创建一个
[1] Riccardo Bettati,et al. A quantitative analysis of anonymous communications , 2004, IEEE Transactions on Reliability.
[2] Rajesh Krishnan,et al. Using signal processing to analyze wireless data traffic , 2002, WiSE '02.
[3] Athina Markopoulou,et al. Assessing the quality of voice communications over internet backbones , 2003, TNET.
[4] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[5] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[6] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[7] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[8] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[9] Gene Tsudik,et al. Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[10] Brian D. Carrier,et al. A recursive session token protocol for use in computer forensics and TCP traceback , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[11] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[12] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[13] Clay Shields,et al. Providing Process Origin Information to Aid in Network Traceback , 2002, USENIX Annual Technical Conference, General Track.
[14] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[15] Thierry Pun,et al. Content adaptive watermarking based on a stochastic multiresolution image modeling , 2000, 2000 10th European Signal Processing Conference.
[16] Hiroaki Etoh,et al. Finding a Connection Chain for Tracing Intruders , 2000, ESORICS.
[17] Brian Neil Levine,et al. Hordes: a Multicast-Based Protocol for Anonymity , 2002, J. Comput. Secur..
[18] Douglas S. Reeves,et al. Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones , 2002, ESORICS.
[19] Vern Paxson,et al. On calibrating measurements of packet transit times , 1998, SIGMETRICS '98/PERFORMANCE '98.
[20] Riccardo Bettati,et al. On Flow Marking Attacks in Wireless Anonymous Communication Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[21] G. McLachlan,et al. The EM algorithm and extensions , 1996 .
[22] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[23] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[24] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[25] B. K. Ghosh,et al. Handbook of sequential analysis , 1991 .
[26] Sarah Granger,et al. Social Engineering Fundamentals, Part I: Hacker Tactics , 2003 .
[27] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[28] Riccardo Bettati,et al. On Flow Correlation Attacks and Countermeasures in Mix Networks , 2004, Privacy Enhancing Technologies.
[29] Bernd Girod,et al. Fundamental performance limits of power-spectrum condition-compliant watermarks , 2000, Electronic Imaging.
[30] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[31] Deepa Kundur,et al. Diversity and attack characterization for improved robust watermarking , 2001, IEEE Trans. Signal Process..
[32] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[33] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[34] Peng Ning,et al. On the secrecy of timing-based active watermarking trace-back techniques , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[35] Vern Paxson. End-to-end internet packet dynamics , 1999, TNET.
[36] Vern Paxson,et al. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.
[37] Peter J. Rousseeuw,et al. Finding Groups in Data: An Introduction to Cluster Analysis , 1991 .
[38] Douglas S. Reeves,et al. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays , 2003, CCS '03.
[39] Micah Adler,et al. Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..