메뉴 건너뛰기




Volumn , Issue , 2011, Pages 197-206

Exposing invisible timing-based traffic watermarks with BACKLIT

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMITY NETWORKS; BULK TRANSFER; DETECTION PERFORMANCE; DETECTION SYSTEM; FALSE POSITIVE; INTERACTIVE TRAFFICS; NETWORK FLOWS; NETWORK SECURITY AND PRIVACY; PASSIVE MODE; PEER TO PEER; PLANETLAB; STEPPING STONE; TCP FLOWS; TIMING INFORMATION; WATERMARKING SCHEMES;

EID: 84862967527     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2076732.2076760     Document Type: Conference Paper
Times cited : (34)

References (36)
  • 1
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays," in Proc. ACM CCS, 2003.
    • (2003) Proc. ACM CCS
    • Wang, X.1    Reeves, D.2
  • 3
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • X. Wang, S. Chen, and S. Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems," in Proc. IEEE Symp. Security and Privacy, 2007.
    • (2007) Proc. IEEE Symp. Security and Privacy
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 4
    • 78049393668 scopus 로고    scopus 로고
    • A first step towards live botmaster traceback
    • D. Ramsbrock, X. Wang, and X. Jiang, "A first step towards live botmaster traceback," in Proc. RAID, 2008.
    • (2008) Proc. RAID
    • Ramsbrock, D.1    Wang, X.2    Jiang, X.3
  • 5
    • 33745773302 scopus 로고    scopus 로고
    • Tracking anonymous peer-to-peer voip calls on the Internet
    • X. Wang, S. Chen, and S. Jajodia, "Tracking anonymous peer-to-peer voip calls on the Internet," in Proc. ACM CCS, 2005.
    • (2005) Proc. ACM CCS
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 6
    • 85177693003 scopus 로고    scopus 로고
    • RAINBOW: A robust and invisible non-blind watermark for network flows
    • A. Houmansadr, N. Kiyavash, and N. Borisov, "RAINBOW: A robust and invisible non-blind watermark for network flows," in Proc. NDSS, 2009.
    • (2009) Proc. NDSS
    • Houmansadr, A.1    Kiyavash, N.2    Borisov, N.3
  • 7
    • 85180621070 scopus 로고    scopus 로고
    • SWIRL: A scalable watermark to detect correlated network flows
    • A. Houmansadr and N. Borisov, "SWIRL: A scalable watermark to detect correlated network flows," in Proc. NDSS, 2011.
    • (2011) Proc. NDSS
    • Houmansadr, A.1    Borisov, N.2
  • 8
    • 70349301114 scopus 로고    scopus 로고
    • Timing analysis in low-latency mix networks: Attacks and defenses?
    • V. Shmatikov and M. Wang, "Timing analysis in low-latency mix networks: attacks and defenses?" in Proc. ESORICS, 2006.
    • (2006) Proc. ESORICS
    • Shmatikov, V.1    Wang, M.2
  • 9
    • 84862973659 scopus 로고    scopus 로고
    • Studying timing analysis on the Internet with SubRosa
    • H. Daginawala and M. Wright, "Studying timing analysis on the Internet with SubRosa," in Proc. PET, 2008.
    • (2008) Proc. PET
    • Daginawala, H.1    Wright, M.2
  • 10
    • 69749095702 scopus 로고    scopus 로고
    • Dependent link padding algorithms for low latency anonymity systems
    • W. Wang, M. Motani, and V. Srinivasan, "Dependent link padding algorithms for low latency anonymity systems," in Proc. ACM CCS, 2008.
    • (2008) Proc. ACM CCS
    • Wang, W.1    Motani, M.2    Srinivasan, V.3
  • 13
    • 47049102528 scopus 로고    scopus 로고
    • One-way delay measurement and characterization
    • A. Hernandez and E. Magana, "One-way delay measurement and characterization," in Proc. IEEE ICNS, 2007.
    • (2007) Proc. IEEE ICNS
    • Hernandez, A.1    Magana, E.2
  • 14
    • 0036629689 scopus 로고    scopus 로고
    • Traffic characterisation and modelling
    • N. Macfadyen, "Traffic characterisation and modelling," BT Technology Journal, vol. 20, no. 3, 2002.
    • (2002) BT Technology Journal , vol.20 , Issue.3
    • MacFadyen, N.1
  • 16
    • 42149086458 scopus 로고    scopus 로고
    • Analysis of Internet backbone traffic and header anomalies observed
    • W. John and S. Tafvelin, "Analysis of Internet backbone traffic and header anomalies observed," in Proc. ACM/USENIX IMC, 2007.
    • (2007) Proc. ACM/USENIX IMC
    • John, W.1    Tafvelin, S.2
  • 21
    • 11844255712 scopus 로고    scopus 로고
    • Packet dispersion techniques and a capacity-estimation methodology
    • C. Dovrolis, P. Ramanathan, and D. Moore, "Packet dispersion techniques and a capacity-estimation methodology," IEEE/ACM Trans. Networking, vol. 12, no. 6, 2004.
    • (2004) IEEE/ACM Trans. Networking , vol.12 , Issue.6
    • Dovrolis, C.1    Ramanathan, P.2    Moore, D.3
  • 24
    • 60349101742 scopus 로고    scopus 로고
    • Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
    • R. Perdisci, G. Gu, and W. Lee., "Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems," in Proc. IEEE ICDM, 2006.
    • (2006) Proc. IEEE ICDM
    • Perdisci, R.1    Gu, G.2    Lee, W.3
  • 25
    • 17444379739 scopus 로고    scopus 로고
    • Packet reordering, high speed networks and transport protocol performance
    • L. Gharai, C. Perkins, and T. Lehman, "Packet reordering, high speed networks and transport protocol performance," in Proc. IEEE ICCCN, 2004.
    • (2004) Proc. IEEE ICCCN
    • Gharai, L.1    Perkins, C.2    Lehman, T.3
  • 26
    • 0003336357 scopus 로고    scopus 로고
    • TCP congestion control
    • April
    • M. Allman, V. Paxson, and W. Stevens, "TCP congestion control," RFC 2581, April 1999.
    • (1999) RFC , vol.2581
    • Allman, M.1    Paxson, V.2    Stevens, W.3
  • 27
    • 33947517231 scopus 로고    scopus 로고
    • Measurement and classification of out-of-sequence packets in a tier-1 IP backbone
    • S. Jaiswal, G. Iannaccone, C.Diot, J. Kurose, and D. Towsley, "Measurement and classification of out-of-sequence packets in a tier-1 IP backbone," IEEE/ACM Trans. Networking, vol. 15, no. 1, 2007.
    • (2007) IEEE/ACM Trans. Networking , vol.15 , Issue.1
    • Jaiswal, S.1    Iannaccone, G.2    Diot, C.3    Kurose, J.4    Towsley, D.5
  • 31
    • 84862913334 scopus 로고    scopus 로고
    • "libssh2," http://www.libssh2.org/, 2011.
    • (2011)
  • 33
    • 33745802064 scopus 로고    scopus 로고
    • Detection of interactive stepping stones: Algorithms and confidence bounds
    • A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Proc. RAID, 2004.
    • (2004) Proc. RAID
    • Blum, A.1    Song, D.2    Venkataraman, S.3
  • 34
    • 48649102224 scopus 로고    scopus 로고
    • Efficient detection of delay-constrained relay nodes
    • B. Coskun and N. Memon, "Efficient detection of delay-constrained relay nodes," in Proc. ACSAC, 2007.
    • (2007) Proc. ACSAC
    • Coskun, B.1    Memon, N.2
  • 36


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.