메뉴 건너뛰기




Volumn 25, Issue 2, 2006, Pages 97-105

Uncovering identities: A study into VPN tunnel fingerprinting

Author keywords

Fingerprinting; Internet Key Exchange (IKE); IPSec; Traffic analysis; Virtual Private Network (VPN)

Indexed keywords

FINGERPRINTING; INTERNET KEY EXCHANGE (IKE); IPSEC; TRAFFIC ANALYSIS; VIRTUAL PRIVATE NETWORK (VPN);

EID: 33644781732     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2005.12.008     Document Type: Article
Times cited : (3)

References (27)
  • 1
    • 84858555172 scopus 로고    scopus 로고
    • Research on tunneling techniques in virtual private networks
    • Z. Aqun, Y. Yuan, J. Yi, and G. Guanqun Research on tunneling techniques in virtual private networks Correspondence Journal 21 6 2000 Note: Journal entry may not be accurate [Original in Chinese, translated by babelfish.altavista.com]
    • (2000) Correspondence Journal , vol.21 , Issue.6
    • Aqun, Z.1    Yuan, Y.2    Yi, J.3    Guanqun, G.4
  • 3
    • 33644766345 scopus 로고    scopus 로고
    • ICMP based remote OS TCP/IP stack fingerprinting techniques
    • O. Arkin, and F. Yarochkin ICMP based remote OS TCP/IP stack fingerprinting techniques Phrack Magazine 11 57 2001 [File 7 of 12]
    • (2001) Phrack Magazine , vol.11 , Issue.57
    • Arkin, O.1    Yarochkin, F.2
  • 4
    • 35048886013 scopus 로고    scopus 로고
    • A robust classifier for passive TCP/IP fingerprinting
    • Passive and active network measurement, 5th international workshop, PAM 2004, Antibes Juan-les-Pins, France, April 19-20, 2004, Proceedings, Springer
    • R. Beverly A robust classifier for passive TCP/IP fingerprinting Passive and active network measurement, 5th international workshop, PAM 2004, Antibes Juan-les-Pins, France, April 19-20, 2004, Proceedings Lecture notes in computer science vol. 3015 2004 Springer
    • (2004) Lecture Notes in Computer Science , vol.3015
    • Beverly, R.1
  • 7
    • 33644770675 scopus 로고    scopus 로고
    • Cisco Systems
    • Cisco Systems, Inc. IP fragmentation and PMTUD Document ID: 25885. Tech. rep. 2004 Cisco Systems
    • (2004) IP Fragmentation and PMTUD
  • 8
    • 33644759830 scopus 로고    scopus 로고
    • . Napalm e-zineNote: the source for this reference was not readily available, however it was traced with help from ouah_@hotmail.com and datacide@beefed.org;
    • . Detection with ARP. Napalm e-zineNote: the source for this reference was not readily available, however it was traced with help from ouah_@hotmail.com and datacide@beefed.org ; 2000.
    • (2000) Detection with ARP
  • 9
    • 33644750826 scopus 로고    scopus 로고
    • IKE Negotiation for IPSec Security Associations June [a Microsoft TechNet publication]
    • Davies J. IKE Negotiation for IPSec Security Associations. The cable guy; June 2002 [a Microsoft TechNet publication].
    • (2002) The Cable Guy
    • Davies, J.1
  • 10
    • 33644749709 scopus 로고    scopus 로고
    • Hewlett-Packard Company, Infrastructure Strategic Engineering Division
    • N. Dunbar IPSec networking standards - an overview Tech. rep. 2001 Hewlett-Packard Company, Infrastructure Strategic Engineering Division
    • (2001) IPSec Networking Standards - An Overview
    • Dunbar, N.1
  • 13
    • 84980010995 scopus 로고    scopus 로고
    • NTA monitor UDP backoff pattern fingerprinting white paper
    • Hills R. NTA monitor UDP backoff pattern fingerprinting white paper. Tech. rep. NTA; 2003.
    • (2003) Tech. Rep. NTA
    • Hills, R.1
  • 16
    • 33644761303 scopus 로고    scopus 로고
    • MSc. dissertation. South Africa: Computer Science Department, University of Pretoria
    • Izadinia VD. Fingerprinting encrypted tunnel endpoints. MSc. dissertation. South Africa: Computer Science Department, University of Pretoria; 2004.
    • (2004) Fingerprinting Encrypted Tunnel Endpoints
    • Izadinia, V.D.1
  • 17
    • 33644784189 scopus 로고    scopus 로고
    • racoon(8), racoon.conf(5), setkey(8)
    • KAME. Racoon manual pages - racoon(8), racoon.conf(5), setkey(8); 2000.
    • (2000) Racoon Manual Pages
  • 18
    • 0042981058 scopus 로고
    • A course in number theory and cryptography
    • 2nd ed. Springer Verlag
    • N. Koblitz A course in number theory and cryptography 2nd ed. Graduate texts in mathematics vol. 114 1994 Springer Verlag
    • (1994) Graduate Texts in Mathematics , vol.114
    • Koblitz, N.1
  • 20
    • 4143082935 scopus 로고    scopus 로고
    • Combining active and passive network measurements to build scalable monitoring systems on the grid
    • Lowekamp B. Combining active and passive network measurements to build scalable monitoring systems on the grid. ACM SIGMETRICS Performance Evaluation Review 30; 2003.
    • (2003) ACM SIGMETRICS Performance Evaluation Review , vol.30
    • Lowekamp, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.