메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1497-1500

Multi-flowattack resistant watermarks for network flows

Author keywords

Flow linking; Flow watermarks; Multiflow attack

Indexed keywords

COUNTER MEASURES; EMBEDDED WATERMARKS; FLOW LINKING; FLOW WATERMARKS; MULTIFLOW ATTACK; MULTIPLE FLOWS; NETWORK FLOWS; SECRET PARAMETERS; WATERMARKING ATTACK; WATERMARKING SCHEMES;

EID: 70349207215     PISSN: 15206149     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICASSP.2009.4959879     Document Type: Conference Paper
Times cited : (29)

References (9)
  • 1
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • J.F. Raymond, "Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems," LECTURE NOTES IN COMPUTER SCIENCE, pp. 10-29, 2001.
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , pp. 10-29
    • Raymond, J.F.1
  • 2
    • 85084161090 scopus 로고    scopus 로고
    • Detecting stepping stones
    • Steven Bellovin and Greg Rose, Eds, Berkeley, CA, USA, Aug, USENIX Association
    • Y. Zhang and V. Paxson, "Detecting stepping stones," in USENIX Security Symposium, Steven Bellovin and Greg Rose, Eds., Berkeley, CA, USA, Aug. 2000, pp. 171-184, USENIX Association.
    • (2000) USENIX Security Symposium , pp. 171-184
    • Zhang, Y.1    Paxson, V.2
  • 3
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • Vijay Atluri, Ed, New York, NY, USA, ACM
    • X. Wang and D. S. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays," in ACM Conference on Computer and Communications Security, Vijay Atluri, Ed., New York, NY, USA, 2003, pp. 20-29, ACM.
    • (2003) ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D.S.2
  • 4
    • 33745773302 scopus 로고    scopus 로고
    • Tracking anonymous peer-to-peer VoIP calls on the Internet
    • Catherine Meadows, Ed, New York, NY, USA, Nov, ACM
    • Xinyuan Wang, Shiping Chen, and Sushil Jajodia, "Tracking anonymous peer-to-peer VoIP calls on the Internet," in ACM Conference on Computer and Communications Security, Catherine Meadows, Ed., New York, NY, USA, Nov. 2005, pp. 81-91, ACM.
    • (2005) ACM Conference on Computer and Communications Security , pp. 81-91
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 5
    • 34548314612 scopus 로고    scopus 로고
    • Y. Pyun, Y. Park, X. Wang, D. S. Reeves, and P. Ning, Tracing traffic through intermediate hosts that repacketize flows, in IEEE Conference on Computer Communications (INFOCOM), George Kesidis, Eytan Modiano, and R. Srikant, Eds., May 2007, pp. 634-642.
    • Y. Pyun, Y. Park, X. Wang, D. S. Reeves, and P. Ning, "Tracing traffic through intermediate hosts that repacketize flows," in IEEE Conference on Computer Communications (INFOCOM), George Kesidis, Eytan Modiano, and R. Srikant, Eds., May 2007, pp. 634-642.
  • 6
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • X. Wang, S. Chen, and S. Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems," In Pfitzmann and McDaniel [9], pp. 116-130.
    • Pfitzmann and McDaniel , vol.9 , pp. 116-130
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 7
    • 34548755641 scopus 로고    scopus 로고
    • DSSS-based flow marking technique for invisible traceback
    • W. Yu, X. Fu, S. Graham, D.Xuan, and W. Zhao, "DSSS-based flow marking technique for invisible traceback," In Pfitzmann and McDaniel [9], pp. 18-32.
    • Pfitzmann and McDaniel , vol.9 , pp. 18-32
    • Yu, W.1    Fu, X.2    Graham, S.3    Xuan, D.4    Zhao, W.5
  • 9
    • 70349211040 scopus 로고    scopus 로고
    • Birgit Pfitzmann and Patrick McDaniel, Eds, May
    • Birgit Pfitzmann and Patrick McDaniel, Eds., IEEE Symposium on Security and Privacy, May 2007.
    • (2007) IEEE Symposium on Security and Privacy


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.