Privacy-preserving network forensics

Privacy-preserving attribution of IP packets can help balance forensics with an individual's right to privacy.

[1]  Franklin F. Kuo,et al.  Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols, 1986, Stowe, Vermont, United States, August 5-7, 1986 , 1986, SIGCOMM.

[2]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[3]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[4]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[5]  Birgit Pfitzmann,et al.  Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.

[6]  Eddie Kohler,et al.  The Click modular router , 1999, SOSP.

[7]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[8]  Yin Zhang,et al.  Detecting Stepping Stones , 2000, USENIX Security Symposium.

[9]  Dawn Xiaodong Song,et al.  Quasi-Efficient Revocation in Group Signatures , 2002, Financial Cryptography.

[10]  Jan Camenisch,et al.  Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.

[11]  Craig Partridge,et al.  Single-packet IP traceback , 2002, TNET.

[12]  Mark Carson,et al.  NIST Net: a Linux-based network emulation tool , 2003, CCRV.

[13]  Mihir Bellare,et al.  Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.

[14]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[15]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[16]  Xin Liu,et al.  Efficient and Secure Source Authentication with Packet Passports , 2006, SRUTI.

[17]  Nick Feamster,et al.  Accountable internet protocol (aip) , 2008, SIGCOMM '08.

[18]  H. Niedermayer,et al.  Accountable Internet Protocol , 2009 .