메뉴 건너뛰기




Volumn 5143 LNCS, Issue , 2008, Pages 31-46

Don't clog the queue! Circuit clogging and mitigation in P2P anonymity schemes

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; SOIL STRUCTURE INTERACTIONS;

EID: 54249091264     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85230-8_3     Document Type: Conference Paper
Times cited : (9)

References (29)
  • 1
    • 54249148237 scopus 로고    scopus 로고
    • AN.ON: Anonymity online, http://anon.inf.tu-dresden.de/
    • AN.ON: Anonymity online, http://anon.inf.tu-dresden.de/
  • 2
    • 84947242344 scopus 로고    scopus 로고
    • Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, 2137, pp. 245-257. Springer, Heidelberg (2001)
    • Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
  • 3
    • 35048846490 scopus 로고    scopus 로고
    • Blum, A., Song, D., Venkataraman, S.: Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, 3224, pp. 258-277. Springer, Heidelberg (2004)
    • Blum, A., Song, D., Venkataraman, S.: Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 258-277. Springer, Heidelberg (2004)
  • 5
    • 54249163150 scopus 로고    scopus 로고
    • Dai, W, Two attacks against freedom
    • Dai, W.: Two attacks against freedom
  • 6
    • 84904332394 scopus 로고    scopus 로고
    • Statistical disclosure attacks: Traffic confirmation in open environments
    • Gritzalis, Vimercati, Samarati, and Katsikas eds, Kluwer, Dordrecht
    • Danezis, G.: Statistical disclosure attacks: Traffic confirmation in open environments. In: Gritzalis, Vimercati, Samarati, and Katsikas (eds.) Proceedings of Security and Privacy in the Age of Uncertainty (SEC 2003), IFIP TC 11, pp. 421-426. Kluwer, Dordrecht (2003)
    • (2003) Proceedings of Security and Privacy in the Age of Uncertainty (SEC 2003), IFIP , vol.TC 11 , pp. 421-426
    • Danezis, G.1
  • 7
    • 85084161366 scopus 로고    scopus 로고
    • Dingledine, R., Mathewson, N., Syverson, PF.: Tor: The second-generation onion router. In: 13th USENIX Security Symposium (August 2004)
    • Dingledine, R., Mathewson, N., Syverson, PF.: Tor: The second-generation onion router. In: 13th USENIX Security Symposium (August 2004)
  • 9
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • Fawcett, T.: An introduction to ROC analysis. Pattern Recognition Letters 27(8), 861-874 (2006)
    • (2006) Pattern Recognition Letters , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1
  • 11
    • 84957796461 scopus 로고    scopus 로고
    • Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson. P.F. (eds.) PET 2002. LNCS, 2482, pp. 171-178. Springer, Heidelberg (2003)
    • Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson. P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 171-178. Springer, Heidelberg (2003)
  • 14
    • 33846288517 scopus 로고    scopus 로고
    • Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, 3110, pp. 251-265. Springer, Heidelberg (2004)
    • Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251-265. Springer, Heidelberg (2004)
  • 15
    • 54249169793 scopus 로고    scopus 로고
    • Mathewson. N., Dingledine. R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424. Springer, Heidelberg (2005)
    • Mathewson. N., Dingledine. R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424. Springer, Heidelberg (2005)
  • 18
    • 38149130456 scopus 로고    scopus 로고
    • Murdoch, S.J., Zieliński, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 167-183. Springer, Heidelberg (2007)
    • Murdoch, S.J., Zieliński, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 167-183. Springer, Heidelberg (2007)
  • 20
    • 33646046492 scopus 로고    scopus 로고
    • The bittorrent p2p file-sharing system: Measurements and analysis
    • Castro, M, van Renesse, R, eds, IPTPS 2005, Springer, Heidelberg
    • Pouwelse, J.A., Garbacki, P., Epema, D.H.J., Sips, H.J.: The bittorrent p2p file-sharing system: Measurements and analysis. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 205-216. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3640 , pp. 205-216
    • Pouwelse, J.A.1    Garbacki, P.2    Epema, D.H.J.3    Sips, H.J.4
  • 21
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks. Design Issues, and Open Problems
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Raymond, J.-E: Traffic Analysis: Protocols, Attacks. Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10-29. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.-E.1
  • 24
    • 35248841429 scopus 로고    scopus 로고
    • Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 36-52. Springer, Heidelberg (2003)
    • Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 36-52. Springer, Heidelberg (2003)
  • 25
    • 0142250280 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
    • Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116-131. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2808 , pp. 116-131
    • Serjantov, A.1    Sewell, P.2
  • 26
    • 33750276494 scopus 로고    scopus 로고
    • Timing analysis in low-latency mix networks: Attacks and defenses
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Shmatikov, V., Wang, M.-H.: Timing analysis in low-latency mix networks: Attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18-33. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 18-33
    • Shmatikov, V.1    Wang, M.-H.2
  • 27
    • 77049097177 scopus 로고    scopus 로고
    • Tabriz, P., Borisov, N.: Breaking the collusion detection mechanism of morphmix. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 368-383. Springer, Heidelberg (2006)
    • Tabriz, P., Borisov, N.: Breaking the collusion detection mechanism of morphmix. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 368-383. Springer, Heidelberg (2006)
  • 28
    • 84871199341 scopus 로고    scopus 로고
    • Wiangsripanawan, R., Susilo, W., Safavi-Naini, R.: Design principles for low latency anonymous network systems secure against timing attacks. In: Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW 2007), pp. 183-191. Australian Computer Society, Inc., Darlinghurst (2007)
    • Wiangsripanawan, R., Susilo, W., Safavi-Naini, R.: Design principles for low latency anonymous network systems secure against timing attacks. In: Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW 2007), pp. 183-191. Australian Computer Society, Inc., Darlinghurst (2007)
  • 29
    • 84954435745 scopus 로고    scopus 로고
    • Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending anonymous communication against passive logging attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)
    • Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending anonymous communication against passive logging attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.