메뉴 건너뛰기




Volumn 21, Issue 7, 2010, Pages 954-967

Correlation-based traffic analysis attacks on anonymity networks

Author keywords

Anonymity; Anonymous communication; Flow correlation attack; Mixes; Privacy

Indexed keywords

CORRELATION METHODS; DATA PRIVACY; FREQUENCY DOMAIN ANALYSIS; MIXING;

EID: 77953123409     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2009.146     Document Type: Article
Times cited : (47)

References (46)
  • 1
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb.
    • D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Comm. ACM, vol.24, no.2, pp. 84-90, Feb. 1981.
    • (1981) Comm. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 2
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • R. Dingledine and P. Syverson, eds Apr.
    • A. Serjantov and G. Danezis, "Towards an Information Theoretic Metric for Anonymity," Proc. Privacy Enhancing Technologies Workshop (PET '02), R. Dingledine and P. Syverson, eds., pp. 41- 53, Apr. 2002.
    • (2002) Proc. Privacy Enhancing Technologies Workshop (PET '02) , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 20
  • 24
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • X. Wang and D.S. Reeves, "Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Manipulation of Interpacket Delays," Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 20-29, 2003.
    • (2003) Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03) , pp. 20-29
    • Wang, X.1    Reeves, D.S.2
  • 28
    • 33846627316 scopus 로고    scopus 로고
    • Anonymity analysis of mix networks against flow-correlation attacks
    • Y. Zhu, X. Fu, R. Bettati, and W. Zhao, "Anonymity Analysis of Mix Networks against Flow-Correlation Attacks," Proc. IEEE GLOBECOM '05, vol.3, pp. 1801-1805, 2005.
    • (2005) Proc. IEEE GLOBECOM '05 , vol.3 , pp. 1801-1805
    • Zhu, Y.1    Fu, X.2    Bettati, R.3    Zhao, W.4
  • 34
    • 24344471201 scopus 로고    scopus 로고
    • F.B.I, "Carnivore Diagnostic Tool," http://www.fbi.gov/hq/lab/ carnivore/carnivore2.htm, 2003.
    • (2003) Carnivore Diagnostic Tool
  • 35
    • 77953119740 scopus 로고    scopus 로고
    • tcpdump.org
    • tcpdump.org, "tcpdump," http://www.tcpdump.org/, 2003.
    • (2003)
  • 36
    • 24344496450 scopus 로고    scopus 로고
    • cisco.inc.
    • cisco.inc., "Netflow Services Solutions Guide," http://www.cisco. com/univercd/cc/td/doc/cisintwk/intsolns/netflsol/nfwhite. htm, 2003.
    • (2003) Netflow Services Solutions Guide
  • 37
    • 0024621174 scopus 로고
    • On estimation of entropy and mutual information of continuous distributions
    • R. Moddemeijer, "On Estimation of Entropy and Mutual Information of Continuous Distributions," Signal Processing, vol.16, no.3, pp. 233-246, 1989.
    • (1989) Signal Processing , vol.16 , Issue.3 , pp. 233-246
    • Moddemeijer, R.1
  • 38
    • 0031164639 scopus 로고    scopus 로고
    • The linearity of low frequency traffic flow: An intrinsic i/o property in queueing systems
    • June
    • S.-q. Li and J.D. Pruneski, "The Linearity of Low Frequency Traffic Flow: An Intrinsic I/O Property in Queueing Systems," IEEE/ ACM Trans. Networking, vol.5, no.3, pp. 429-443, June 1997.
    • (1997) IEEE/ ACM Trans. Networking , vol.5 , Issue.3 , pp. 429-443
    • Li, S.-Q.1    Pruneski, J.D.2
  • 39
    • 77953119878 scopus 로고    scopus 로고
    • [39] netfilter.org, "Netfilter," http://netfilter.samba.org/, 2003.
    • (2003) Netfilter
  • 40
    • 24344490149 scopus 로고    scopus 로고
    • TimeSys, "Timesys Linux Docs," http://www.timesys.com/, 2003.
    • (2003) Timesys Linux Docs
  • 41
    • 17444412778 scopus 로고    scopus 로고
    • Nist Net: A linux-based network emulation tool
    • July
    • M. Carson and D. Santay, "Nist Net: A Linux-Based Network Emulation Tool," ACM SIGCOMM Computer Comm. Rev., vol.33, no.3, http://portal.acm. org/citation.cfm?id=956993.957007, pp. 111-126, July 2003.
    • (2003) ACM SIGCOMM Computer Comm. Rev. , vol.33 , Issue.3 , pp. 111-126
    • Carson, M.1    Santay, D.2
  • 44
    • 0032594135 scopus 로고    scopus 로고
    • Promoting the use of end-to-end congestion control in the internet
    • Aug.
    • S. Floyd and K. Fall, "Promoting the Use of End-to-End Congestion Control in the Internet," IEEE/ACM Trans. Networking, vol.7, no.4, pp. 458-472, Aug. 1999.
    • (1999) IEEE/ACM Trans. Networking , vol.7 , Issue.4 , pp. 458-472
    • Floyd, S.1    Fall, K.2
  • 45
    • 0032178265 scopus 로고    scopus 로고
    • Modeling TCP Throughput: A simple model and its empirical validation
    • J. Padhye, V. Firoiu, D.F. Towsley, and J.F. Kurose, "Modeling TCP Throughput: A Simple Model and its Empirical Validation," Proc. ACM SIGCOMM '98, pp. 303-314, 1998.
    • (1998) Proc. ACM SIGCOMM '98 , pp. 303-314
    • Padhye, J.1    Firoiu, V.2    Towsley, D.F.3    Kurose, J.F.4
  • 46
    • 0030189675 scopus 로고    scopus 로고
    • Simulation-Based comparisons of tahoe, reno and sack TCP
    • Aug.
    • K. Fall and S. Floyd, "Simulation-Based Comparisons of Tahoe, Reno and SACK TCP," SIGCOMM Computer Comm. Rev., vol.26, no.3, pp. 5-21, Aug. 1996.
    • (1996) SIGCOMM Computer Comm. Rev. , vol.26 , Issue.3 , pp. 5-21
    • Fall, K.1    Floyd, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.