메뉴 건너뛰기




Volumn , Issue , 2011, Pages 215-226

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting

Author keywords

Anonymity; Attacks; Throughput

Indexed keywords

ANONYMITY; ANONYMOUS COMMUNICATION; ATTACKS; ERROR RATE; HIGH CONFIDENCE; LOW-LATENCY; MULTIPLE CONNECTIONS; TCP CONNECTIONS; TRAFFIC ANALYSIS; UNLINKABILITY;

EID: 80755187817     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046732     Document Type: Conference Paper
Times cited : (99)

References (51)
  • 1
    • 80755145235 scopus 로고    scopus 로고
    • http://netfiles.uiuc.edu/mittal2/www/throughput-fingerprinting.html.
  • 2
    • 56449096542 scopus 로고    scopus 로고
    • Cisco Systems, Inc., Cisco IOS Netflow. http://www.cisco.com/en/US/ products/ps6601/products-ios-protocol-group-home.html.
    • Cisco IOS Netflow
  • 3
    • 80755134970 scopus 로고    scopus 로고
    • Symantec data loss prevention. http://www.Symantec.com/business/products/ family.jsp?familyid=data-loss-prevention.
  • 7
    • 0038650844 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In IH (2001).
    • (2001) IH
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 10
    • 56649105529 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • BORISOV, N., DANEZIS, G., MITTAL, P., AND TABRIZ, P. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In CCS (2007).
    • (2007) CCS
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 11
    • 80755145232 scopus 로고    scopus 로고
    • Traffic analysis against low-latency anonymity networks using available bandwidth estimation
    • CHAKRAVARTY, S., STAVROU, A., AND KEROMYTIS, A. D. Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In ESORICS (2010).
    • (2010) ESORICS
    • Chakravarty, S.1    Stavrou, A.2    Keromytis, A.D.3
  • 12
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • CHAUM, D. Untraceable electronic mail, return addresses, and digital pseudonyms. CACM 24, 2 (1981).
    • (1981) CACM , vol.24 , pp. 2
    • Chaum, D.1
  • 14
    • 80755134967 scopus 로고    scopus 로고
    • Mixminion: Design of a type III anonymous remailer protocol
    • DANEZIS, G., DINGLEDINE, R., AND MATHEWSON, N. Mixminion: Design of a Type III anonymous remailer protocol. In IEEE S&P (2003).
    • (2003) IEEE S&P
    • Danezis, G.1    Dingledine, R.2    Mathewson, N.3
  • 17
    • 74049136866 scopus 로고    scopus 로고
    • AS-awareness in tor path selection
    • EDMAN, M., AND SYVERSON, P. AS-awareness in Tor path selection. In CCS (2009).
    • (2009) CCS
    • Edman, M.1    Syverson, P.2
  • 20
    • 20444439634 scopus 로고    scopus 로고
    • Location diversity in anonymity networks
    • FEAMSTER, N., AND DINGLEDINE, R. Location diversity in anonymity networks. In WPES (2004).
    • (2004) WPES
    • Feamster, N.1    Dingledine, R.2
  • 21
    • 0002532939 scopus 로고
    • On the probable error of a coefficient of correlation deduced from a small sample
    • FISHER, R. On the probable error of a coefficient of correlation deduced from a small sample. Metron (1921).
    • (1921) Metron
    • Fisher, R.1
  • 22
    • 85031542311 scopus 로고    scopus 로고
    • Mixing E-mail with babel
    • GULCU, C, AND TSUDIK, G. Mixing E-mail with Babel. In NDSS (1996).
    • (1996) NDSS
    • Gulcu, C.1    Tsudik, G.2
  • 23
    • 56749132464 scopus 로고    scopus 로고
    • Rethinking internet traffic management: From multiple decompositions to a practical protocol
    • HE, J., SUCHARA, M., BRESLER, M., REXFORD, J., AND CHIANG, M. Rethinking Internet traffic management: From multiple decompositions to a practical protocol. In CoNext (2007).
    • (2007) CoNext
    • He, J.1    Suchara, M.2    Bresler, M.3    Rexford, J.4    Chiang, M.5
  • 24
    • 70349692738 scopus 로고    scopus 로고
    • HOW much anonymity does network latency leak?
    • HOPPER, N., VASSERMAN, E. Y., AND CHAN-TIN, E. HOW much anonymity does network latency leak? In CCS (2007).
    • (2007) CCS
    • Hopper, N.1    Vasserman, E.Y.2    Chan-Tin, E.3
  • 26
    • 84906750191 scopus 로고    scopus 로고
    • A scalable watermark to detect correlated network flows
    • HOUMANSADR, A., AND BORISOV, N. SWIRL: A scalable watermark to detect correlated network flows. In NDSS (2011).
    • (2011) NDSS
    • Houmansadr, A.1    Borisov2    Swirl, N.3
  • 28
  • 29
    • 0004128169 scopus 로고    scopus 로고
    • JACOBSON, V. Pathchar. http: //www.caida.org/tools/utilities/others/ pathchar/.
    • Pathchar
    • Jacobson, V.1
  • 30
    • 1642380665 scopus 로고    scopus 로고
    • Limits of anonymity in open environments
    • KESDOGAN, D., AGRAWAL, D., AND PENZ, S. Limits of anonymity in open environments. In IH (2002).
    • (2002) IH
    • Kesdogan, D.1    Agrawal, D.2    Penz, S.3
  • 32
    • 77955329300 scopus 로고    scopus 로고
    • Measuring the tor network from public directory information
    • LOESING, K. Measuring the Tor network from public directory information. In HotPets (2009).
    • (2009) HotPets
    • Loesing, K.1
  • 33
    • 74049120310 scopus 로고    scopus 로고
    • Don't clog the queue! Circuit clogging and mitigation in P2P anonymity schemes
    • MCLACHLAN, J., AND HOPPER, N. Don't clog the queue! Circuit clogging and mitigation in P2P anonymity schemes. In FC (2008).
    • (2008) FC
    • Mclachlan, J.1    Hopper, N.2
  • 35
    • 78149315577 scopus 로고    scopus 로고
    • Securing mediated trace access using black-box permutation analysis
    • MITTAL, P., PAXSON, V., SOMMER, R., AND WINTERROWD, M. Securing mediated trace access using black-box permutation analysis. In HotNets (2009).
    • (2009) HotNets
    • Mittal, P.1    Paxson, V.2    Sommer, R.3    Winterrowd, M.4
  • 37
    • 34547339276 scopus 로고    scopus 로고
    • Hot or not: Revealing hidden services by their clock skew
    • MURDOCH, S. J. Hot or not: Revealing hidden services by their clock skew. In CCS (2006).
    • (2006) CCS
    • Murdoch, S.J.1
  • 38
    • 80755188449 scopus 로고    scopus 로고
    • Low-cost traffic analysis of tor
    • MURDOCH, S. J., AND DANEZIS, G. Low-cost traffic analysis of Tor. In IEEE S&P (2005).
    • (2005) IEEE S&P
    • Murdoch, S.J.1    Danezis, G.2
  • 39
    • 50249160688 scopus 로고    scopus 로고
    • Sampled traffic analysis by internet-exchange-level adversaries
    • MURDOCH, S. J., AND ZIELINSKI, P. Sampled traffic analysis by Internet-exchange-level adversaries. In PETS (2007).
    • (2007) PETS
    • Murdoch, S.J.1    Zielinski, P.2
  • 41
    • 0032178265 scopus 로고    scopus 로고
    • Modeling TCP throughput: A simple model and its empirical validation
    • PADHYE, J., FIROIU, V., TOWSLEY, D., AND KUROSE, J. Modeling tcp throughput: a simple model and its empirical validation. SIGCOMM Comput. Commun. Rev. 28 (October 1998), 303-314. (Pubitemid 128566467)
    • (1998) Computer Communication Review , vol.28 , Issue.4 , pp. 303-314
    • Padhye, J.1    Firoiu, V.2    Towsley, D.3    Kurose, J.4
  • 42
    • 77955330802 scopus 로고    scopus 로고
    • Torflow: Tor network analysis
    • PERRY, M. Torflow: Tor network analysis. In HotPets (2009).
    • (2009) HotPets
    • Perry, M.1
  • 43
    • 0038311863 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues, and open problems
    • RAYMOND, J.-F. Traffic analysis: Protocols, attacks, design issues, and open problems. In Designing Privacy Enhancing Technologies (2000).
    • (2000) Designing Privacy Enhancing Technologies
    • Raymond, J.-F.1
  • 44
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • SERJANTOV, A., AND DANEZIS, G. Towards an information theoretic metric for anonymity. In PET (2002).
    • (2002) PET
    • Serjantov, A.1    Danezis, G.2
  • 45
    • 80055013636 scopus 로고    scopus 로고
    • Eigenspeed: Secure peer-to-peer bandwidth evaluation
    • SNADER, R., AND BORISOV, N. Eigenspeed: Secure peer-to-peer bandwidth evaluation. In IPTPS (2009).
    • (2009) IPTPS
    • Snader, R.1    Borisov, N.2
  • 48
    • 84870633783 scopus 로고    scopus 로고
    • THE TOR PROJECT. Tor metrics portal. http://metrics.torproject.org/.
    • Tor Metrics Portal
  • 49
    • 84994593259 scopus 로고    scopus 로고
    • Accessed Februrary 2011
    • THE TOR PROJECT. Who uses Tor. http://www.torproject.org/about/torusers. html.en. Accessed Februrary 2011.
    • Who Uses Tor
  • 50
    • 27944460736 scopus 로고    scopus 로고
    • An analysis of the degradation of anonymous protocols
    • WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. An analysis of the degradation of anonymous protocols. In NDSS (2002).
    • (2002) NDSS
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4
  • 51
    • 80755145224 scopus 로고    scopus 로고
    • Defending anonymous communication against passive logging attacks
    • WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. Defending anonymous communication against passive logging attacks. In IEEE S&P (2003).
    • (2003) IEEE S&P
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.