메뉴 건너뛰기




Volumn 6345 LNCS, Issue , 2010, Pages 249-267

Traffic analysis against low-latency anonymity networks using available bandwidth estimation

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; NETWORK SECURITY;

EID: 78049387804     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15497-3_16     Document Type: Conference Paper
Times cited : (28)

References (36)
  • 1
    • 85165863135 scopus 로고    scopus 로고
    • AS Peering Analysis, http://www.netconfigs.com/general/anoverview.htm
    • AS Peering Analysis
  • 2
    • 85165847458 scopus 로고    scopus 로고
    • CAIDA Router Measurements
    • CAIDA Router Measurements, http://www.caida.org/tools/taxonomy/routing. xml
  • 3
    • 85165842378 scopus 로고    scopus 로고
    • DETER Network Security Testbed
    • DETER Network Security Testbed, https://www.isi.deterlab.net
  • 4
    • 85165839687 scopus 로고    scopus 로고
    • I2P Anonymous Network
    • I2P Anonymous Network, http://www.i2p2.de/
  • 5
    • 85165851665 scopus 로고    scopus 로고
    • Rocketfuel: An ISP Topology Mapping Engine
    • Rocketfuel: An ISP Topology Mapping Engine, http://www.cs.washington.edu/ research/networking/rocketfuel/
  • 6
    • 85165855458 scopus 로고    scopus 로고
    • Internet Mapping Project
    • The Internet Mapping Project, http://www.cheswick.com/ches/map/
  • 7
    • 3042699909 scopus 로고    scopus 로고
    • Measuring anonymity: The disclosure attack
    • Agrawal, D., Kesdogan, D.: Measuring Anonymity: The Disclosure Attack. IEEE Security & Privacy 1(6), 27-34 (2003)
    • (2003) IEEE Security & Privacy , vol.1 , Issue.6 , pp. 27-34
    • Agrawal, D.1    Kesdogan, D.2
  • 8
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Moskowitz, I. S. ed., Springer, Heidelberg
    • Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I. S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
    • (2001) IH 2001. LNCS , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 19
    • 84955557456 scopus 로고    scopus 로고
    • Hiding routing information
    • Anderson, R. ed., Springer, Heidelberg
    • Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137-150. Springer, Heidelberg (1996)
    • (1996) IH 1996. LNCS , vol.1174 , pp. 137-150
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 22
    • 85165838381 scopus 로고    scopus 로고
    • JAP
    • JAP, http://anon. inf.tu-dresden. de/
  • 30
    • 56649123231 scopus 로고    scopus 로고
    • Compromising anonymity using packet spinning
    • Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. eds., Springer, Heidelberg
    • Pappas, V., Athanasopoulos, E., Ioannidis, S., Markatos, E. P.: Compromising Anonymity Using Packet Spinning. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 161-174. Springer, Heidelberg (2008)
    • (2008) ISC 2008. LNCS , vol.5222 , pp. 161-174
    • Pappas, V.1    Athanasopoulos, E.2    Ioannidis, S.3    Markatos, E.P.4
  • 36
    • 65249165857 scopus 로고    scopus 로고
    • An improved clock-skew measurement technique for revealing Hidden services
    • San Jose, USA, July 2008
    • Zander, S., Murdoch, S.: An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In: Proceedings of 17th USENIX Security Symposium (USENIX Security), San Jose, USA, July 2008, pp. 211-225 (2008)
    • (2008) Proceedings of 17th USENIX Security Symposium (USENIX Security) , pp. 211-225
    • Zander, S.1    Murdoch, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.