메뉴 건너뛰기




Volumn , Issue , 2009, Pages 31-41

Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier

Author keywords

Forensics; Low latency anonymity; Text mining; Traffic analysis

Indexed keywords

ABSOLUTE FREQUENCY; BAYES CLASSIFIER; ENCRYPTED TUNNELS; EXTERNAL OBSERVER; FALSE ALARMS; FREQUENCY DISTRIBUTIONS; IP PACKETS; LOW-LATENCY; MULTIHOP; MULTINOMIALS; NOVEL METHODS; OPEN SSL; PRIVACY ENHANCING TECHNOLOGIES; REAL-WORLD; SINGLE-HOP; TEXT MINING; TEXT MINING TECHNIQUES; TRAFFIC ANALYSIS;

EID: 74049147408     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1655008.1655013     Document Type: Conference Paper
Times cited : (376)

References (38)
  • 5
    • 74049120573 scopus 로고    scopus 로고
    • Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa
    • N. Borisov and P. Golle, editors, Canada, June 20-22, Revised Selected Papers, of, Springer
    • N. Borisov and P. Golle, editors. Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, volume 4776 of Lecture Notes in Computer Science. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4776
  • 6
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • February
    • D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 4(2), February 1981.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 11
    • 24944524538 scopus 로고    scopus 로고
    • Privacy Enhancing Technologies, Second International Workshop, PET 2002
    • R. Dingledine and P. F. Syverson, editors, San Francisco, CA, USA, April 14-15, Revised Papers, of, Springer
    • R. Dingledine and P. F. Syverson, editors. Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, volume 2482 of Lecture Notes in Computer Science. Springer, 2003.
    • (2002) Lecture Notes in Computer Science , vol.2482
  • 14
    • 6344251217 scopus 로고    scopus 로고
    • Fingerprinting Websites Using Traffic Analysis
    • A. Hintz. Fingerprinting Websites Using Traffic Analysis. In Dingledine and Syverson [11], pages 171-178.
    • Dingledine and Syverson , vol.11 , pp. 171-178
    • Hintz, A.1
  • 16
    • 74049163517 scopus 로고    scopus 로고
    • G. H. John and P. Langley. Estimating Continuous Distributions in Bayesian Classifiers. In P. Besnard and S. Hanks, editors, UAI, pages 338-345. Morgan Kaufmann, 1995.
    • G. H. John and P. Langley. Estimating Continuous Distributions in Bayesian Classifiers. In P. Besnard and S. Hanks, editors, UAI, pages 338-345. Morgan Kaufmann, 1995.
  • 18
  • 20
    • 33845232198 scopus 로고    scopus 로고
    • On the privacy risks of publishing anonymized ip network traces
    • H. Leitold and E. P. Markatos, editors, Communications and Multimedia Security, of, Springer
    • D. Koukis, S. Antonatos, and K. G. Anagnostakis. On the privacy risks of publishing anonymized ip network traces. In H. Leitold and E. P. Markatos, editors, Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, pages 22-32. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4237 , pp. 22-32
    • Koukis, D.1    Antonatos, S.2    Anagnostakis, K.G.3
  • 24
    • 74049157218 scopus 로고    scopus 로고
    • S. Mistry and B. Raman. Quantifying Traffic Analysis of Encrypted Web-Browsing. http://bmrc.berkeley.edu/people/shailen/Classes/Security Fall98/paper.ps, December 1998.
    • S. Mistry and B. Raman. Quantifying Traffic Analysis of Encrypted Web-Browsing. http://bmrc.berkeley.edu/people/shailen/Classes/Security Fall98/paper.ps, December 1998.
  • 28
    • 33845212639 scopus 로고    scopus 로고
    • A. Panchenko and L. Pimenidis. Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. In Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, 4237 of Lecture Notes in Computer Science, pages 240-251, 2006.
    • A. Panchenko and L. Pimenidis. Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. In Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, volume 4237 of Lecture Notes in Computer Science, pages 240-251, 2006.
  • 29
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • New York, NY, USA, Springer-Verlag New York, Inc
    • J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In International workshop on Designing privacy enhancing technologies, pages 10-29, New York, NY, USA, 2001. Springer-Verlag New York, Inc.
    • (2001) International workshop on Designing privacy enhancing technologies , pp. 10-29
    • Raymond, J.-F.1
  • 33
    • 74049126249 scopus 로고    scopus 로고
    • Performance Comparison of Low-Latency Anonymisation Services from a User Perspective
    • R. Wendolsky, D. Herrmann, and H. Federrath. Performance Comparison of Low-Latency Anonymisation Services from a User Perspective. In Borisov and Golle [5], pages 233-253.
    • Borisov and Golle , vol.5 , pp. 233-253
    • Wendolsky, R.1    Herrmann, D.2    Federrath, H.3
  • 34
    • 33750283653 scopus 로고    scopus 로고
    • A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification
    • N. Williams, S. Zander, and G. Armitage. A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification. SIGCOMM Comput. Commun. Rev., 36(5):5-16, 2006.
    • (2006) SIGCOMM Comput. Commun. Rev , vol.36 , Issue.5 , pp. 5-16
    • Williams, N.1    Zander, S.2    Armitage, G.3
  • 35
    • 0003957032 scopus 로고    scopus 로고
    • Data Mining: Practical Machine Learning Tools and Techniques
    • Second Edition , Morgan Kaufmann, June
    • I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems). Morgan Kaufmann, June 2005.
    • (2005) Morgan Kaufmann Series in Data Management Systems
    • Witten, I.H.1    Frank, E.2
  • 38
    • 24344461274 scopus 로고    scopus 로고
    • D. Zuev and A. W. Moore. Traffic Classification Using a Statistical Approach. In C. Dovrolis, editor, PAM, 3431 of Lecture Notes in Computer Science, pages 321-324. Springer, 2005.
    • D. Zuev and A. W. Moore. Traffic Classification Using a Statistical Approach. In C. Dovrolis, editor, PAM, volume 3431 of Lecture Notes in Computer Science, pages 321-324. Springer, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.