메뉴 건너뛰기




Volumn 5587 LNCS, Issue , 2009, Pages 157-175

Browser fingerprinting from coarse traffic summaries: Techniques and implications

Author keywords

Application fingerprinting; Machine learning; Malware detection; Traffic deanonymization

Indexed keywords

APPLICATION FINGERPRINTING; MACHINE LEARNING; MALWARE DETECTION; MALWARES; NETWORK INTRUSION DETECTION SYSTEMS; PRECISION AND RECALL; TRAFFIC DEANONYMIZATION; WEB TRAFFIC;

EID: 70350629594     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02918-9_10     Document Type: Conference Paper
Times cited : (35)

References (34)
  • 1
    • 49949094072 scopus 로고    scopus 로고
    • Traffic aggregation for malware detection
    • Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
    • Yen, T.-F., Reiter, M.K.: Traffic aggregation for malware detection. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 207-227. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 207-227
    • Yen, T.-F.1    Reiter, M.K.2
  • 2
    • 85084161026 scopus 로고    scopus 로고
    • Comer, D.E., Lin, J.C.: Probing TCP implementations. In: Proceedings of the USENIX Summer 1994 Technical Conference (June 1994)
    • Comer, D.E., Lin, J.C.: Probing TCP implementations. In: Proceedings of the USENIX Summer 1994 Technical Conference (June 1994)
  • 3
    • 0034781944 scopus 로고    scopus 로고
    • On inferring TCP behavior
    • August, 2001
    • Padhye, J., Floyd, S.: On inferring TCP behavior. In: Proceedings of ACM SIGCOMM, August 2001, pp. 287-298 (2001)
    • (2001) Proceedings of ACM SIGCOMM , pp. 287-298
    • Padhye, J.1    Floyd, S.2
  • 4
    • 0030609304 scopus 로고    scopus 로고
    • Automated packet trace analysis of TCP implementations
    • Paxson, V.: Automated packet trace analysis of TCP implementations. In: Proceedings of ACM SIGCOMM, pp. 167-179 (1997)
    • (1997) Proceedings of ACM SIGCOMM , pp. 167-179
    • Paxson, V.1
  • 6
    • 35048886013 scopus 로고    scopus 로고
    • Beverly, R.: A robust classifier for passive TCP/IP fingerprinting. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, 3015, pp. 158-167. Springer, Heidelberg (2004)
    • Beverly, R.: A robust classifier for passive TCP/IP fingerprinting. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 158-167. Springer, Heidelberg (2004)
  • 9
    • 33646932974 scopus 로고    scopus 로고
    • Hernandez-Campos, F., Nobel, A.B., Smith, F.D., Jeffay, K.: Understanding patterns of TCP connection usage with statistical clustering. In: Proceedings of 13th Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, September 2005, pp. 35-44 (2005)
    • Hernandez-Campos, F., Nobel, A.B., Smith, F.D., Jeffay, K.: Understanding patterns of TCP connection usage with statistical clustering. In: Proceedings of 13th Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, September 2005, pp. 35-44 (2005)
  • 10
    • 14944383480 scopus 로고    scopus 로고
    • Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, October 2004, pp. 135-148 (2004)
    • Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, October 2004, pp. 135-148 (2004)
  • 12
    • 33750229702 scopus 로고    scopus 로고
    • Finding peer-to-peer file-sharing using coarse network behaviors
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Collins, M.P., Reiter, M.K.: Finding peer-to-peer file-sharing using coarse network behaviors. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 1-17. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 1-17
    • Collins, M.P.1    Reiter, M.K.2
  • 14
    • 24344442716 scopus 로고    scopus 로고
    • Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, 3431, pp. 41-54. Springer, Heidelberg (2005)
    • Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41-54. Springer, Heidelberg (2005)
  • 15
    • 35348815604 scopus 로고    scopus 로고
    • Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and discriminating between web and peer-to-peer traffic in the network core. In: Proceedings of the 16th International World Wide Web Conference (May 2007)
    • Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and discriminating between web and peer-to-peer traffic in the network core. In: Proceedings of the 16th International World Wide Web Conference (May 2007)
  • 16
    • 33845232198 scopus 로고    scopus 로고
    • Koukis, D., Antonatos, S., Anagnostakis, K.: On the privacy risks of publishing anonymized IP network traces. In: Proceedings of Communications and Multimedia Security, October 2006, pp. 22-32 (2006)
    • Koukis, D., Antonatos, S., Anagnostakis, K.: On the privacy risks of publishing anonymized IP network traces. In: Proceedings of Communications and Multimedia Security, October 2006, pp. 22-32 (2006)
  • 17
    • 70350688486 scopus 로고    scopus 로고
    • Coull, S.E., Wright, C.V., Monrose, F., Collins, M.P., Reiter, M.K.: Playing devil's advocate: Inferring sensitive information from anonymized network traces. In: Proceedings of the 2007 ISOC Network and Distributed System Security Symposium (February 2007)
    • Coull, S.E., Wright, C.V., Monrose, F., Collins, M.P., Reiter, M.K.: Playing devil's advocate: Inferring sensitive information from anonymized network traces. In: Proceedings of the 2007 ISOC Network and Distributed System Security Symposium (February 2007)
  • 18
    • 84937846451 scopus 로고    scopus 로고
    • Coull, S.E., Collins, M.P., Wright, C.V., Monrose, F., Reiter, M.K.: On web browsing privacy in anonymized NetFlows. In: Proceedings of the 16th USENIX Security Symposium, August 2007, pp. 339-352 (2007)
    • Coull, S.E., Collins, M.P., Wright, C.V., Monrose, F., Reiter, M.K.: On web browsing privacy in anonymized NetFlows. In: Proceedings of the 16th USENIX Security Symposium, August 2007, pp. 339-352 (2007)
  • 19
    • 84899126047 scopus 로고    scopus 로고
    • Shankar, U., Paxson, V.: Active mapping: Resisting NIDS evasion without altering traffic. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)
    • Shankar, U., Paxson, V.: Active mapping: Resisting NIDS evasion without altering traffic. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)
  • 23
    • 3242743560 scopus 로고    scopus 로고
    • A framework for the evaluation of session reconstruction heuristics in web-usage analysis
    • Spiliopoulou, M., Mobasher, B., Berendt, B.: A framework for the evaluation of session reconstruction heuristics in web-usage analysis. INFORMS Journal on Computing 15(2) (2003)
    • (2003) INFORMS Journal on Computing , vol.15 , Issue.2
    • Spiliopoulou, M.1    Mobasher, B.2    Berendt, B.3
  • 27
    • 70350644144 scopus 로고    scopus 로고
    • Joachims, T.: Text categorization with support vector machines: Learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, 1398. Springer, Heidelberg (1998)
    • Joachims, T.: Text categorization with support vector machines: Learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398. Springer, Heidelberg (1998)
  • 28
    • 0030673582 scopus 로고    scopus 로고
    • Osuna, E., Freund, R., Girosit, F.: Training support vector machines: an application to face detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (June 1997)
    • Osuna, E., Freund, R., Girosit, F.: Training support vector machines: an application to face detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (June 1997)
  • 29
    • 85093872656 scopus 로고    scopus 로고
    • Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (April 2007)
    • Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (April 2007)
  • 30
    • 33745442732 scopus 로고    scopus 로고
    • Gates, C., Becknel, B.: Host anomalies from network data. In: Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop (June 2005)
    • Gates, C., Becknel, B.: Host anomalies from network data. In: Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop (June 2005)
  • 31
    • 85075837457 scopus 로고    scopus 로고
    • Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the USENIX Security Symposium (August 2008)
    • Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the USENIX Security Symposium (August 2008)
  • 32
    • 38149070087 scopus 로고    scopus 로고
    • Collins, M.P., Reiter, M.K.: Hit-list worm detection and bot identification in large networks using protocol graphs. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 276-295. Springer, Heidelberg (2007)
    • Collins, M.P., Reiter, M.K.: Hit-list worm detection and bot identification in large networks using protocol graphs. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 276-295. Springer, Heidelberg (2007)
  • 33
    • 70350672890 scopus 로고    scopus 로고
    • Xu, K., Zhang, Z., Bhattacharyya, S.: Profiling internet backbone traffic: Behavior models and applications. In: Proceedings of ACM SIGCOMM (August 2005)
    • Xu, K., Zhang, Z., Bhattacharyya, S.: Profiling internet backbone traffic: Behavior models and applications. In: Proceedings of ACM SIGCOMM (August 2005)
  • 34
    • 24344488334 scopus 로고    scopus 로고
    • Aiello, W., Kalmanek, C., McDaniel, P., Sen, S., Spatscheck, O., Van der Merwe, J.E.: Analysis of communities of interest in data networks. In: Dovrolis, C. (ed.) PAM 2005. LNCS, 3431, pp. 83-96. Springer, Heidelberg (2005)
    • Aiello, W., Kalmanek, C., McDaniel, P., Sen, S., Spatscheck, O., Van der Merwe, J.E.: Analysis of communities of interest in data networks. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 83-96. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.