메뉴 건너뛰기




Volumn , Issue , 2008, Pages 307-320

Multi-flow attacks against network flow watermarking schemes

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS COMMUNICATION; INTERACTIVE TRAFFICS; MARKOV MODULATED POISSON PROCESS; MULTIPLE WATERMARKS; NETWORK FLOW WATERMARKING; PROBABILISTIC MODELING; SECRET PARAMETERS; TIME-DEPENDENT CORRELATION;

EID: 80052167664     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (74)

References (29)
  • 2
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Apr. I. S. Moskowitz, Ed.,. of Lecture Notes in Computer Science, Springer-Verlag
    • BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Information Hiding Workshop (Apr. 2001), I. S. Moskowitz, Ed., vol. 2137 of Lecture Notes in Computer Science, Springer-Verlag, pp. 245–247.
    • (2001) Information Hiding Workshop , vol.2137 , pp. 245-247
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 4
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • A.LU
    • BENDER, W., GRUHL, D., MORIMOTO, N., AND A.LU. Techniques for data hiding. IBM Systems Journal 35, 3/4 (1996), 313–336.
    • (1996) IBM Systems Journal , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3
  • 5
    • 35048846490 scopus 로고    scopus 로고
    • Detection of interactive stepping stones: Algorithms and confidence bounds
    • Sept. E. Jonsson, A. Valdes, and M. Almgren, Eds.,. of Lecture Notes in Computer Science, Springer
    • BLUM, A., SONG, D. X., AND VENKATARAMAN, S. Detection of interactive stepping stones: Algorithms and confidence bounds. In International Symposium on Recent Advances in Intrusion Detection (Sept. 2004), E. Jonsson, A. Valdes, and M. Almgren, Eds., vol. 3224 of Lecture Notes in Computer Science, Springer, pp. 258–277.
    • (2004) International Symposium on Recent Advances in Intrusion Detection , vol.3224 , pp. 258-277
    • Blum, A.1    Song, D.X.2    Venkataraman, S.3
  • 6
    • 33645586953 scopus 로고    scopus 로고
    • The anonymizer: Protecting user privacy on the web
    • September
    • BOYAN, J. The anonymizer: Protecting user privacy on the web. Computer-Mediated Communication Magazine 4, 9 (September 1997).
    • (1997) Computer-Mediated Communication Magazine , vol.4 , pp. 9
    • Boyan, J.1
  • 7
    • 0036482863 scopus 로고    scopus 로고
    • The time-rescaling theorem and its application to neural spike train data analysis
    • BROWN, E. N., BARBIERI, R., VENTURA, V., KASS, R. E., AND FRANK, L. M. The time-rescaling theorem and its application to neural spike train data analysis. Neural Computation 14, 2 (2002), 325–346.
    • (2002) Neural Computation , vol.14 , Issue.2 , pp. 325-346
    • Brown, E.N.1    Barbieri, R.2    Ventura, V.3    Kass, R.E.4    Frank, L.M.5
  • 8
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • CHAUM, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (February 1981), 84–90.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 11
    • 85084161366 scopus 로고    scopus 로고
    • ToR: The second-generation onion router
    • Aug. M. Blaze, Ed., USENIX Association
    • DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. Tor: The second-generation onion router. In USENIX Security Symposium (Aug. 2004), M. Blaze, Ed., USENIX Association, pp. 303–320.
    • (2004) USENIX Security Symposium , pp. 303-320
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.3
  • 12
    • 84958977733 scopus 로고    scopus 로고
    • Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
    • Oct. A. Wespi, G. Vigna, and L. Deri, Eds.,. of Lecture Notes in Computer Science, Springer
    • DONOHO, D., FLESIA, A., SHANKAR, U., PAXSON, V., COIT, J., AND STANIFORD, S. Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In International Symposium on Recent Advances in Intrusion Detection (Oct. 2002), A. Wespi, G. Vigna, and L. Deri, Eds., vol. 2516 of Lecture Notes in Computer Science, Springer, pp. 16–18.
    • (2002) International Symposium on Recent Advances in Intrusion Detection , vol.2516 , pp. 16-18
    • Donoho, D.1    Flesia, A.2    Shankar, U.3    Paxson, V.4    Coit, J.5    Staniford, S.6
  • 14
    • 33749044955 scopus 로고
    • The markov-modulated poisson process (MMPP) cookbook
    • FISCHER, W., AND MEIER-HELLSTERN, K. The Markov-modulated Poisson process (MMPP) cookbook. Performance Evaluation 18, 2 (1993), 149–171.
    • (1993) Performance Evaluation , vol.18 , Issue.2 , pp. 149-171
    • Fischer, W.1    Meier-Hellstern, K.2
  • 19
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of poisson modeling
    • June
    • PAXSON, V., AND FLOYD, S. Wide-area traffic: The failure of Poisson modeling. IEEE/ACM Transactions on Networking 3, 3 (June 1995), 226–244.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 21
    • 34548314612 scopus 로고    scopus 로고
    • Tracing traffic through intermediate hosts that repacketize flows
    • May G. Kesidis, E. Modiano, and R. Srikant, Eds.
    • PYUN, Y., PARK, Y., WANG, X., REEVES, D. S., AND NING, P. Tracing traffic through intermediate hosts that repacketize flows. In IEEE Conference on Computer Communications (INFOCOM) (May 2007), G. Kesidis, E. Modiano, and R. Srikant, Eds., pp. 634–642.
    • (2007) IEEE Conference on Computer Communications (INFOCOM) , pp. 634-642
    • Pyun, Y.1    Park, Y.2    Wang, X.3    Reeves, D.S.4    Ning, P.5
  • 26
    • 84957003012 scopus 로고    scopus 로고
    • Inter-packet delay based correlation for tracing encrypted connections through stepping stones
    • Oct. D. Gollmann, G. Karjoth, and M. Waidner, Eds.,. of Lecture Notes in Computer Science, Springer
    • WANG, X., REEVES, D., AND WU, S. F. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In European Symposium on Research in Computer Security (Oct. 2002), D. Gollmann, G. Karjoth, and M. Waidner, Eds., vol. 2502 of Lecture Notes in Computer Science, Springer, pp. 244–263.
    • (2002) European Symposium on Research in Computer Security , vol.2502 , pp. 244-263
    • Wang, X.1    Reeves, D.2    Wu, S.F.3
  • 27
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
    • Atluri, Ed., ACM
    • WANG, X., AND REEVES, D. S. Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays. In ACM Conference on Computer and Communications Security (2003), V. Atluri, Ed., ACM, pp. 20–29.
    • (2003) ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D.S.2
  • 29
    • 85084161090 scopus 로고    scopus 로고
    • Detecting stepping stones
    • Aug. S. Bellovin and G. Rose, Eds., USENIX Association
    • ZHANG, Y., AND PAXSON, V. Detecting stepping stones. In USENIX Security Symposium (Aug. 2000), S. Bellovin and G. Rose, Eds., USENIX Association, pp. 171–184.
    • (2000) USENIX Security Symposium , pp. 171-184
    • Zhang, Y.1    Paxson, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.