메뉴 건너뛰기




Volumn , Issue , 2009, Pages 161-172

ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies

Author keywords

Anonymity; Peer to peer; Random walks

Indexed keywords

ANONYMOUS COMMUNICATION; ANONYMOUS COMMUNICATION SYSTEMS; DOS ATTACKS; LOW-LATENCY; NEW DESIGN; NEW OPPORTUNITIES; PEER TO PEER; PEER-TO-PEER APPROACH; RANDOM WALK; STATE OF THE ART;

EID: 74049096681     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653683     Document Type: Conference Paper
Times cited : (64)

References (55)
  • 1
    • 0038650844 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of the IH, 2001.
    • (2001) Proceedings of the IH
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 5
    • 56649105529 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • October
    • N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Proceedings of CCS, October 2007.
    • (2007) Proceedings of CCS
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 7
    • 84958740468 scopus 로고    scopus 로고
    • Möbius: An extensible tool for performance and dependability modeling
    • B. R. Haverkort, H. C. Bohnenkamp, and C. U. Smith, editors, Schaumburg, IL, Mar, Springer
    • D. Daly, D. D. Deavours, J. M. Doyle, P. G. Webster, and W. H. Sanders. Möbius: An extensible tool for performance and dependability modeling. In B. R. Haverkort, H. C. Bohnenkamp, and C. U. Smith, editors, Computer Performance Evaluation: Modelling Techniques and Tools, volume 1786, pages 332-336, Schaumburg, IL, Mar. 2000. Springer.
    • (2000) Computer Performance Evaluation: Modelling Techniques and Tools , vol.1786 , pp. 332-336
    • Daly, D.1    Deavours, D.D.2    Doyle, J.M.3    Webster, P.G.4    Sanders, W.H.5
  • 8
    • 35248866624 scopus 로고    scopus 로고
    • Mix-networks with restricted routes
    • R. Dingledine, editor, Proceedings of PET, Springer-Verlag, March
    • G. Danezis. Mix-networks with restricted routes. In R. Dingledine, editor, Proceedings of PET, pages 1-17. Springer-Verlag, LNCS 2760, March 2003.
    • (2003) LNCS , vol.2760 , pp. 1-17
    • Danezis, G.1
  • 10
    • 0037810717 scopus 로고    scopus 로고
    • Mixminion: Design of a Type III Anonymous Remailer Protocol
    • May
    • G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a Type III Anonymous Remailer Protocol. In Proceedings of S & P, pages 2-15, May 2003.
    • (2003) Proceedings of S & P , pp. 2-15
    • Danezis, G.1    Dingledine, R.2    Mathewson, N.3
  • 12
    • 85180633166 scopus 로고    scopus 로고
    • Sybilinfer: Detecting sybil nodes using social networks
    • G. Danezis and P. Mittal. Sybilinfer: Detecting sybil nodes using social networks. In Proceedings of NDSS, 2009.
    • (2009) Proceedings of NDSS
    • Danezis, G.1    Mittal, P.2
  • 13
    • 74049122156 scopus 로고    scopus 로고
    • Bridging and fingerprinting: Epistemic attacks on route selection
    • Leuven, Belgium, July
    • G. Danezis and P. Syverson. Bridging and fingerprinting: Epistemic attacks on route selection. In Proceedings of PET, Leuven, Belgium, July 2008.
    • (2008) Proceedings of PET
    • Danezis, G.1    Syverson, P.2
  • 15
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • R. Dingledine and P. Syverson, editors, Proceedings of PET, San Diego, CA, April, Springer-Verlag
    • C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of PET, San Diego, CA, April 2002. Springer-Verlag, LNCS 2482.
    • (2002) LNCS , vol.2482
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 18
    • 0038349207 scopus 로고    scopus 로고
    • Tarzan: A peer-to-peer anonymizing network layer
    • Washington, DC, November
    • M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of CCS, Washington, DC, November 2002.
    • (2002) Proceedings of CCS
    • Freedman, M.J.1    Morris, R.2
  • 19
    • 70349298073 scopus 로고    scopus 로고
    • Tor at heart of embassy passwords leak
    • September 10
    • D. Goodin. Tor at heart of embassy passwords leak. The Register, September 10 2007.
    • (2007) The Register
    • Goodin, D.1
  • 20
    • 4544382846 scopus 로고    scopus 로고
    • King: Estimating latency between arbitrary internet end hosts
    • K. P. Gummadi, S. Saroiu, and S. D. Gribble. King: estimating latency between arbitrary internet end hosts. SIGCOMM CCR., 32(3):11-11, 2002.
    • (2002) SIGCOMM CCR , vol.32 , Issue.3 , pp. 11-11
    • Gummadi, K.P.1    Saroiu, S.2    Gribble, S.D.3
  • 21
    • 54049088801 scopus 로고    scopus 로고
    • Achord: A variant of the Chord lookup service for use in censorship resistant peer-to-peer publishing systems
    • Cambridge, MA, Mar
    • S. Hazel and B. Wiley. Achord: A variant of the Chord lookup service for use in censorship resistant peer-to-peer publishing systems. In Proceedings of IPTPS, Cambridge, MA, Mar. 2002.
    • (2002) Proceedings of IPTPS
    • Hazel, S.1    Wiley, B.2
  • 22
    • 85180784621 scopus 로고    scopus 로고
    • Halo: High-assurance locate for distributed hash tables
    • February
    • A. Kapadia and N. Triandopoulos. Halo: High-assurance locate for distributed hash tables. In Proceedings of NDSS, pages 61-79, February 2008.
    • (2008) Proceedings of NDSS , pp. 61-79
    • Kapadia, A.1    Triandopoulos, N.2
  • 24
    • 33846288517 scopus 로고    scopus 로고
    • Timing attacks in low-latency mix-based systems
    • A. Juels, editor, Proceedings of FC, Springer-Verlag, February
    • B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright. Timing attacks in low-latency mix-based systems. In A. Juels, editor, Proceedings of FC, pages 251-265. Springer-Verlag, LNCS 3110, February 2004.
    • (2004) LNCS , vol.3110 , pp. 251-265
    • Levine, B.N.1    Reiter, M.K.2    Wang, C.3    Wright, M.K.4
  • 26
    • 74049120310 scopus 로고    scopus 로고
    • Don't clog the queue: Circuit clogging and mitigation in P2P anonymity schemes
    • January
    • J. McLachlan and N. Hopper. Don't clog the queue: Circuit clogging and mitigation in P2P anonymity schemes. In Proceedings of FC, January 2008.
    • (2008) Proceedings of FC
    • McLachlan, J.1    Hopper, N.2
  • 27
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • R. Merkle. Protocols for public key cryptosystems. In Proceedings of S & P, pages 122-133, 1980.
    • (1980) Proceedings of S & P , pp. 122-133
    • Merkle, R.1
  • 29
    • 70349273917 scopus 로고    scopus 로고
    • Information leaks in structured peer-to-peer anonymous communication
    • October
    • P. Mittal and N. Borisov. Information leaks in structured peer-to-peer anonymous communication. In Proceedings of CCS, October 2008.
    • (2008) Proceedings of CCS
    • Mittal, P.1    Borisov, N.2
  • 30
    • 74049085662 scopus 로고    scopus 로고
    • U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol, Version 2. IETF Internet Draft, July 2003
    • U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol - Version 2. IETF Internet Draft, July 2003.
  • 33
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • New York, NY, USA, ACM
    • A. Nambiar and M. Wright. Salsa: a structured approach to large-scale anonymity. In Proceedings of CCS, pages 17-26, New York, NY, USA, 2006. ACM.
    • (2006) Proceedings of CCS , pp. 17-26
    • Nambiar, A.1    Wright, M.2
  • 35
    • 74049154029 scopus 로고    scopus 로고
    • T. T. Project. Torstatus-tor network status. http://torstatus.kgprog.com/ .
    • T. T. Project. Torstatus-tor network status. http://torstatus.kgprog.com/ .
  • 36
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
    • J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , pp. 10-29
    • Raymond, J.-F.1
  • 37
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • June
    • M. Reiter and A. Rubin. Crowds: Anonymity for web transactions. ACM TISSEC, 1(1), June 1998.
    • (1998) ACM TISSEC , vol.1 , Issue.1
    • Reiter, M.1    Rubin, A.2
  • 38
    • 20444437836 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
    • Washington, DC, USA, November
    • M. Rennhard and B. Plattner. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In Proceedings of WPES, Washington, DC, USA, November 2002.
    • (2002) Proceedings of WPES
    • Rennhard, M.1    Plattner, B.2
  • 39
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
    • November
    • A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Middleware, pages 329-350, November 2001.
    • (2001) Middleware , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 41
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proceedings of PET, 2002.
    • (2002) Proceedings of PET
    • Serjantov, A.1    Danezis, G.2
  • 42
    • 70349301114 scopus 로고    scopus 로고
    • Timing analysis in low-latency mix networks: Attacks and defenses
    • September
    • V. Shmatikov and M.-H. Wang. Timing analysis in low-latency mix networks: Attacks and defenses. In Proceedings of ESORICS, September 2006.
    • (2006) Proceedings of ESORICS
    • Shmatikov, V.1    Wang, M.-H.2
  • 43
    • 84947265806 scopus 로고    scopus 로고
    • Security considerations for peer-to-peer distributed hash tables
    • London, UK, Springer-Verlag
    • E. Sit and R. Morris. Security considerations for peer-to-peer distributed hash tables. In IPTPS, pages 261-269, London, UK, 2002. Springer-Verlag.
    • (2002) IPTPS , pp. 261-269
    • Sit, E.1    Morris, R.2
  • 45
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
    • P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96-114. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4
  • 47
    • 77049097177 scopus 로고    scopus 로고
    • Breaking the collusion detection mechanism of MorphMix
    • G. Danezis and P. Golle, editors, Cambridge, UK, June, Springer
    • P. Tabriz and N. Borisov. Breaking the collusion detection mechanism of MorphMix. In G. Danezis and P. Golle, editors, Proceedings of PET, pages 368-384, Cambridge, UK, June 2006. Springer.
    • (2006) Proceedings of PET , pp. 368-384
    • Tabriz, P.1    Borisov, N.2
  • 49
    • 74049141616 scopus 로고    scopus 로고
    • Bt admits misleading customers over Phorm experiments
    • March 17
    • C. Williams. Bt admits misleading customers over Phorm experiments. The Register, March 17 2008.
    • (2008) The Register
    • Williams, C.1
  • 52
    • 40049087740 scopus 로고    scopus 로고
    • Passive logging attacks against anonymous communications
    • May
    • M. Wright, M. Adler, B. N. Levine, and C. Shields. Passive logging attacks against anonymous communications. ACM TISSEC, 11(2), May 2008.
    • (2008) ACM TISSEC , vol.11 , Issue.2
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4
  • 53
    • 45749116664 scopus 로고    scopus 로고
    • Sybillimit: A near-optimal social network defense against sybil attacks
    • P
    • H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against sybil attacks. In Proceedings of S & P, 2008.
    • Proceedings of S & , pp. 2008
    • Yu, H.1    Gibbons, P.B.2    Kaminsky, M.3    Xiao, F.4
  • 54
    • 33750285481 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. SIGCOMM CCR., 36(4):267-278, 2006.
    • (2006) SIGCOMM CCR , vol.36 , Issue.4 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.