Characterization of Tor Traffic using Time based Features
暂无分享,去创建一个
Ali A. Ghorbani | Arash Habibi Lashkari | Mohammad Saiful Islam Mamun | Gerard Draper-Gil | A. Ghorbani | M. Mamun | G. Draper-Gil
[1] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[2] Mohamed Ali Kâafar,et al. Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.
[3] Ali A. Ghorbani,et al. Characterization of Encrypted and VPN Traffic using Time-related Features , 2016, ICISSP.
[4] Zhen Ling,et al. TorWard: Discovery of malicious traffic over Tor , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[5] Ian Goldberg,et al. Enhancing Tor's performance using real-time traffic classification , 2012, CCS.
[6] Yong Zhang,et al. Traffic Identification of Tor and Web-Mix , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Junzhou Luo,et al. Inferring Application Type Information from Tor Encrypted Traffic , 2014, 2014 Second International Conference on Advanced Cloud and Big Data.
[9] A. Nur Zincir-Heywood,et al. A Proxy Identifier Based on Patterns in Traffic Flows , 2015, 2015 IEEE 16th International Symposium on High Assurance Systems Engineering.
[10] Peter Sewell,et al. Passive-attack analysis for connection-based anonymity systems , 2004, International Journal of Information Security.
[11] Antonio Pescapè,et al. Issues and future directions in traffic classification , 2012, IEEE Network.
[12] Prateek Mittal,et al. Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting , 2011, CCS '11.
[13] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.
[14] Grenville J. Armitage,et al. A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.
[15] Judith Kelner,et al. A Survey on Internet Traffic Identification , 2009, IEEE Communications Surveys & Tutorials.
[16] Angelos D. Keromytis,et al. On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records , 2014, PAM.
[17] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[18] Rachel Greenstadt,et al. A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.