Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication
暂无分享,去创建一个
[1] Angelos D. Keromytis,et al. Identifying Proxy Nodes in a Tor Anonymization Circuit , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.
[2] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[3] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[4] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[5] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[6] Angelos D. Keromytis,et al. Approximating a Global Passive Adversary Against Tor , 2008 .
[7] Nikita Borisov,et al. Cirripede: circumvention infrastructure using router redirection with plausible deniability , 2011, CCS '11.
[8] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[9] Nicholas Hopper,et al. Routing around decoys , 2012, CCS.
[10] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[11] Arun Venkataramani,et al. iPlane Nano: Path Prediction for Peer-to-Peer Applications , 2009, NSDI.
[12] Nick Feamster,et al. Location diversity in anonymity networks , 2004, WPES '04.
[13] Roger Dingledine,et al. A Practical Congestion Attack on Tor Using Long Paths , 2009, USENIX Security Symposium.
[14] Salvatore J. Stolfo,et al. Automating the injection of believable decoys to detect snooping , 2010, WiSec '10.
[15] Paul F. Syverson,et al. As-awareness in Tor path selection , 2009, CCS.
[16] Stefan Lindskog,et al. How the Great Firewall of China is Blocking Tor , 2012, FOCI.
[17] Peter Phaal,et al. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks , 2001, RFC.
[18] W. Timothy Strayer,et al. Decoy Routing: Toward Unblockable Internet Communication , 2011, FOCI.
[19] Jedidiah R. Crandall,et al. Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[20] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[21] Julian Soh,et al. Monitoring and Reporting , 2015 .
[22] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[23] Pierangela Samarati,et al. Proceedings of the 8th ACM conference on Computer and Communications Security , 1998, CCS 2001.
[24] Dirk Grunwald,et al. BitBlender: light-weight anonymity for BitTorrent , 2008, AIPACa '08.
[25] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[26] Angelos D. Keromytis,et al. Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation , 2010, ESORICS.
[27] Ian Goldberg,et al. Improving Tor using a TCP-over-DTLS Tunnel , 2009, USENIX Security Symposium.
[28] John G. Myers. IMAP4 ACL extension , 1997, RFC.
[29] Angelos D. Keromytis,et al. LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes , 2006 .
[30] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[31] Dan Boneh,et al. Proceedings of the 11th USENIX Security Symposium , 2002 .
[32] Stefan Lindskog,et al. Spoiled Onions: Exposing Malicious Tor Exit Relays , 2014, Privacy Enhancing Technologies.
[33] kc claffy,et al. Bandwidth estimation: metrics, measurement techniques, and tools , 2003, IEEE Netw..
[34] Arun Venkataramani,et al. iPlane: an information plane for distributed services , 2006, OSDI '06.
[35] Benoit Claise,et al. Cisco Systems NetFlow Services Export Version 9 , 2004, RFC.
[36] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[37] Thomas E. Anderson,et al. Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.
[38] Clifford Stoll,et al. Stalking the wily hacker , 1988, CACM.
[39] Wei Wang,et al. Dependent link padding algorithms for low latency anonymity systems , 2008, CCS.
[40] Zhen Ling,et al. One Cell is Enough to Break Tor's Anonymity , 2009 .
[41] Vitaly Shmatikov,et al. Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 , 2011, CCS.
[42] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[43] Nicholas Hopper,et al. How much anonymity does network latency leak? , 2007, TSEC.
[44] George Danezis,et al. Proceedings of the 2012 ACM conference on Computer and communications security , 2012, CCS 2012.
[45] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[46] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[47] Micah Adler,et al. An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.
[48] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[49] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[50] Prateek Mittal,et al. Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting , 2011, CCS '11.
[51] Ian Goldberg,et al. An improved algorithm for tor circuit scheduling , 2010, CCS '10.
[52] Malek Ben Salem,et al. Designing Host and Network Sensors to Mitigate the Insider Threat , 2009, IEEE Security & Privacy.
[53] Edgar R. Weippl,et al. Tor HTTP Usage and Information Leakage , 2010, Communications and Multimedia Security.
[54] J. Davenport. Editor , 1960 .
[55] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[56] Wenke Lee,et al. Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection , 2001 .
[57] Ren Wang,et al. TCP Westwood: congestion window control using bandwidth estimation , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[58] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[59] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[60] Steven J. Murdoch,et al. Hot or not: revealing hidden services by their clock skew , 2006, CCS '06.
[61] Sebastian Zander,et al. An Improved Clock-skew Measurement Technique for Revealing Hidden Services , 2008, USENIX Security Symposium.
[62] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[63] Y VassermanEugene,et al. How much anonymity does network latency leak , 2010 .
[64] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[65] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.
[66] Robert Tappan Morris,et al. Vivaldi: a decentralized network coordinate system , 2004, SIGCOMM '04.
[67] Riccardo Bettati,et al. Analytical and empirical analysis of countermeasures to traffic analysis attacks , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..
[68] Sotiris Ioannidis,et al. Compromising Anonymity Using Packet Spinning , 2008, ISC.