Evading stepping-stone detection under the cloak of streaming media with SNEAK
暂无分享,去创建一个
Matthew K. Wright | Madhu Venkateshaiah | Kush Kothari | Jaideep D. Padhye | M. Wright | K. Kothari | Madhu Venkateshaiah
[1] Peng Ning,et al. On the secrecy of timing-based active watermarking trace-back techniques , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[2] Douglas S. Reeves,et al. Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones , 2002, ESORICS.
[3] Nikita Borisov,et al. RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows , 2009, NDSS.
[4] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[5] Xinwen Fu,et al. DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] Sushil Jajodia,et al. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Baugher,et al. The Secure Real-Time Transport Protocol , 2003 .
[8] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[9] George Danezis,et al. The Traffic Analysis of Continuous-Time Mixes , 2004, Privacy Enhancing Technologies.
[10] Jean-Chrysostome Bolot,et al. End-to-end packet delay and loss behavior in the internet , 1993, SIGCOMM '93.
[11] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[12] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[13] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[15] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[16] Vern Paxson,et al. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.
[17] Peng Ning,et al. Tracing Traffic through Intermediate Hosts that Repacketize Flows , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[18] Dawn Xiaodong Song,et al. Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.
[19] Douglas S. Reeves,et al. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays , 2003, CCS '03.
[20] L. Goddard. Information Theory , 1962, Nature.
[21] Cyrus Shahabi,et al. A multi-threshold online smoothing technique for variable rate multimedia streams , 2006, Multimedia Tools and Applications.
[22] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[23] Hiroaki Etoh,et al. Finding a Connection Chain for Tracing Intruders , 2000, ESORICS.
[24] Nikita Borisov,et al. Multi-flow Attacks Against Network Flow Watermarking Schemes , 2008, USENIX Security Symposium.
[25] Robert B. Miller,et al. Response time in man-computer conversational transactions , 1899, AFIPS Fall Joint Computing Conference.
[26] Jaideep D. Padhye. Stepping-stone Network Attack Kit (SNEAK) For Evading Timing-based Detection Methods Under The Cloak Of Constant Rate Multimedia Streams , 2008 .
[27] Riccardo Bettati,et al. On Flow Correlation Attacks and Countermeasures in Mix Networks , 2004, Privacy Enhancing Technologies.
[28] Riccardo Bettati,et al. On effectiveness of link padding for statistical traffic analysis attacks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[29] Madhu Venkateshaiah. Evading Existing Stepping Stone Detection Methods Using Buffering , 2006 .
[30] Robert B. Ash,et al. Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.
[31] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[32] Steven Gianvecchio,et al. Detecting covert timing channels: an entropy-based approach , 2007, CCS '07.
[33] Thomas J. Walsh,et al. Security Considerations for Voice Over IP Systems , 2005 .
[34] Uwe Walter,et al. μ-second precision timer support for the Linux kernel , 2002 .
[35] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[36] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.