메뉴 건너뛰기




Volumn , Issue , 2010, Pages 684-686

Fingerprinting websites using remote traffic analysis

Author keywords

Security

Indexed keywords

BROADBAND USERS; DIRECT OBSERVATION; DISTANCE METRICS; DYNAMIC TIME WARPING; ENCRYPTED TUNNELS; K-NEAREST NEIGHBOR CLASSIFICATION; NEW APPROACHES; SECURITY; SIDE-CHANNEL; SUMMARY STATISTIC; TARGET SYSTEMS; TIME-SERIES DATA; TRAFFIC ANALYSIS; TRAFFIC PATTERN;

EID: 78650031731     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866397     Document Type: Conference Paper
Times cited : (47)

References (11)
  • 3
    • 74049147408 scopus 로고    scopus 로고
    • Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial na "five-bayes classifier
    • ACM
    • D. Herrmann, R. Wendolsky, and H. Federrath. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na "five-bayes classifier. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 31-42. ACM, 2009.
    • (2009) Proceedings of the 2009 ACM Workshop on Cloud Computing Security , pp. 31-42
    • Herrmann, D.1    Wendolsky, R.2    Federrath, H.3
  • 5
    • 0030832833 scopus 로고    scopus 로고
    • Dummynet: A simple approach to the evaluation of network protocols
    • L. Rizzo. Dummynet: a simple approach to the evaluation of network protocols. ACM SIGCOMM Computer Communication Review, 27(1):31-41, 1997.
    • (1997) ACM SIGCOMM Computer Communication Review , vol.27 , Issue.1 , pp. 31-41
    • Rizzo, L.1
  • 7
    • 78650117270 scopus 로고    scopus 로고
    • Devices that tell on you: Privacy trends in consumer ubiquitous computing
    • T. Saponas, J. Lester, C. Hartung, S. Agarwal, T. Kohno, et al. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In Usenix Security, volume 3, page 3, 2007.
    • (2007) Usenix Security , vol.3 , pp. 3
    • Saponas, T.1    Lester, J.2    Hartung, C.3    Agarwal, S.4    Kohno, T.5
  • 11
    • 79959957319 scopus 로고    scopus 로고
    • Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
    • K. Zhang and X. Wang. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In USENIX Security, 2009.
    • (2009) USENIX Security
    • Zhang, K.1    Wang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.