Exploiting Content Delivery Networks for covert channel communications
暂无分享,去创建一个
Tao Zhang | Jia Liu | Xu Si | Yulong Shen | Yongzhi Wang | Xiaopeng Jiao | Ahmed Salem
[1] Maarten Van Horenbeeck,et al. Deception on the network: thinking differently about covert channels , 2006 .
[2] Sudip Saha,et al. DNS for Massive-Scale Command and Control , 2013, IEEE Transactions on Dependable and Secure Computing.
[3] Balachander Krishnamurthy,et al. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites , 2002, WWW.
[4] Abhinav Srivastava,et al. Evaluating email’s feasibility for botnet command and control , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[5] Larry L. Peterson,et al. Reliability and Security in the CoDeeN Content Distribution Network , 2004, USENIX Annual Technical Conference, General Track.
[6] Gabi Nakibly,et al. OSS: Using Online Scanning Services for Censorship Circumvention , 2013, Privacy Enhancing Technologies.
[7] Michael Pearce,et al. A framework for network aware caching for video on demand systems , 2013, TOMCCAP.
[8] Michael Rabinovich,et al. Content Delivery Networks: Protection or Threat? , 2009, ESORICS.
[9] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[10] Aleksandar Kuzmanovic,et al. Thinning akamai , 2008, IMC '08.
[11] Kenton Born. Browser-Based Covert Data Exfiltration , 2010, ArXiv.
[12] Anees Shaikh,et al. Improving the resilience of content distribution networks to large scale distributed denial of service attacks , 2007, Comput. Networks.
[13] Ron M. Roth,et al. Introduction to Coding Theory , 2019, Discrete Mathematics.
[14] Kenton Born. PSUDP: A PASSIVE APPROACH TO NETWORK-WIDE COVERT COMMUNICATION , 2010 .
[15] Jian Jiang,et al. Forwarding-Loop Attacks in Content Delivery Networks , 2016, NDSS.
[16] Bruce M. Maggs,et al. Algorithmic Nuggets in Content Delivery , 2015, CCRV.