메뉴 건너뛰기




Volumn 7384 LNCS, Issue , 2012, Pages 58-78

Website detection using remote traffic analysis

Author keywords

[No Author keywords available]

Indexed keywords

BROADBAND USERS; DYNAMIC TIME WARPING; ERROR RATE; MESSAGE BOARDS; PACKET SIZE DISTRIBUTION; SEMANTIC INFORMATION; SIDE-CHANNEL; TARGET SITES; TRAFFIC ANALYSIS; TRAFFIC MONITORING; TRAFFIC PATTERN;

EID: 84864200547     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-31680-7_4     Document Type: Conference Paper
Times cited : (39)

References (35)
  • 1
    • 19544369316 scopus 로고    scopus 로고
    • An empirical evaluation of wide-area Internet bottlenecks
    • Crovella, M. (ed.), ACM, New York
    • Akella, A., Seshan, S., Shaikh, A.: An empirical evaluation of wide-area Internet bottlenecks. In: Crovella, M. (ed.) 3rd ACM SIGCOMM Conference on Internet Measurement, pp. 101-114. ACM, New York (2003), http://dl.acm.org/ citation.cfm?id=948205.948219
    • (2003) 3rd ACM SIGCOMM Conference on Internet Measurement , pp. 101-114
    • Akella, A.1    Seshan, S.2    Shaikh, A.3
  • 2
    • 33746053876 scopus 로고    scopus 로고
    • Privacy vulnerabilities in encrypted http streams
    • Danezis, G., Martin, D. (eds.), LNCS, Springer, Heidelberg
    • Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy Vulnerabilities in Encrypted HTTP Streams. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 1-11. Springer, Heidelberg (2006)
    • (2006) PET 2005 , vol.3856 , pp. 1-11
    • Bissias, G.D.1    Liberatore, M.2    Jensen, D.3    Levine, B.N.4
  • 4
    • 77955197190 scopus 로고    scopus 로고
    • Side-channel leaks in web applications: A reality today, a challenge tomorrow
    • Evans, D., Vigna, G. (eds.), IEEE Computer Society, May
    • Chen, S., Wang, R., Wang, X., Zhang, K.: Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. In: Evans, D., Vigna, G. (eds.) IEEE Symposium on Security and Privacy, pp. 191-206. IEEE Computer Society (May 2010), http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm? arnumber=5504714
    • (2010) IEEE Symposium on Security and Privacy , pp. 191-206
    • Chen, S.1    Wang, R.2    Wang, X.3    Zhang, K.4
  • 7
    • 35048895319 scopus 로고    scopus 로고
    • Statistical disclosure or intersection attacks on anonymity systems
    • Fridrich, J. (ed.), LNCS, Springer, Heidelberg
    • Danezis, G., Serjantov, A.: Statistical Disclosure or Intersection Attacks on Anonymity Systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 293-308. Springer, Heidelberg (2004), http://www.springerlink.com/index/ TQLJB3HYBK4RUBLA.pdf
    • (2004) IH 2004 , vol.3200 , pp. 293-308
    • Danezis, G.1    Serjantov, A.2
  • 8
    • 85084161366 scopus 로고    scopus 로고
    • Tor: The second-generation onion router
    • Blaze, M. (ed.), USENIX Association, San Diego
    • Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Blaze, M. (ed.) USENIX Security Symposium, pp. 303-320. USENIX Association, San Diego (2004), http://portal.acm.org/citation.cfm?id=1251396
    • (2004) USENIX Security Symposium , pp. 303-320
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.3
  • 9
    • 85076290610 scopus 로고    scopus 로고
    • A practical congestion attack on Tor using long paths
    • Monrose, F. (ed.), USENIX Association, August
    • Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on Tor using long paths. In: Monrose, F. (ed.) 18th USENIX Security Symposium, pp. 33-50. USENIX Association (August 2009), http://www.usenix.org/events/sec09/ tech/full-papers/evans.pdf
    • (2009) 18th USENIX Security Symposium , pp. 33-50
    • Evans, N.S.1    Dingledine, R.2    Grothoff, C.3
  • 10
    • 77952415099 scopus 로고    scopus 로고
    • An inquiry into the nature and causes of the wealth of Internet miscreants
    • De Capitani di Vemarcati, S., Syverson, P. (eds.), ACM, New York
    • Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of Internet miscreants. In: De Capitani di Vemarcati, S., Syverson, P. (eds.) 14th ACM Conference on Computer and Communications Security, pp. 375-388. ACM, New York (2007), http://dl.acm.org/ citation.cfm?id=1315245.1315292
    • (2007) 14th ACM Conference on Computer and Communications Security , pp. 375-388
    • Franklin, J.1    Paxson, V.2    Perrig, A.3    Savage, S.4
  • 11
    • 74049147408 scopus 로고    scopus 로고
    • Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naïve-Bayes classifier
    • ACM, Chicago
    • Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-Bayes classifier. In: ACM Workshop on Cloud Computing Security, pp. 31-42. ACM, Chicago (2009), http://portal.acm.org/citation.cfm?id=1655013
    • (2009) ACM Workshop on Cloud Computing Security , pp. 31-42
    • Herrmann, D.1    Wendolsky, R.2    Federrath, H.3
  • 12
    • 84957796461 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • Dingledine, R., Syverson, P.F. (eds.), LNCS, Springer, Heidelberg
    • Hintz, A.: Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 171-178. Springer, Heidelberg (2003), http://www.springerlink.com/index/C4QWE6D608P2CJYV. pdf
    • (2003) PET 2002 , vol.2482 , pp. 171-178
    • Hintz, A.1
  • 13
    • 70349692738 scopus 로고    scopus 로고
    • How much anonymity does network latency leak?
    • De Capitani di Vimercati, S., Syverson, P. (eds.), ACM, New York
    • Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? In: De Capitani di Vimercati, S., Syverson, P. (eds.) 14th ACM Conference on Computer and Communications Security, pp. 82-91. ACM, New York (2007), http://dl.acm.org/citation.cfm?id=1315245.1315257
    • (2007) 14th ACM Conference on Computer and Communications Security , pp. 82-91
    • Hopper, N.1    Vasserman, E.Y.2    Chan-Tin, E.3
  • 15
    • 77955359942 scopus 로고    scopus 로고
    • Low-cost side channel remote traffic analysis attack in packet networks
    • Xiao, C., Olivier, J.C. (eds.), IEEE, May
    • Kadloor, S., Gong, X., Kiyavash, N., Tezcan, T., Borisov, N.: Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks. In: Xiao, C., Olivier, J.C. (eds.) 2010 IEEE International Conference on Communications. IEEE (May 2010), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5501972
    • (2010) 2010 IEEE International Conference on Communications
    • Kadloor, S.1    Gong, X.2    Kiyavash, N.3    Tezcan, T.4    Borisov, N.5
  • 17
    • 34547350876 scopus 로고    scopus 로고
    • Inferring the source of encrypted HTTP connections
    • Wright, R., De Capitani di Vemarcati, S. (eds.), ACM, New York
    • Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: Wright, R., De Capitani di Vemarcati, S. (eds.) 13th ACM Conference on Computer and Communications Security, pp. 255-263. ACM, New York (2006), http://portal.acm.org/citation.cfm?id=1180437
    • (2006) 13th ACM Conference on Computer and Communications Security , pp. 255-263
    • Liberatore, M.1    Levine, B.N.2
  • 19
    • 27544454707 scopus 로고    scopus 로고
    • Low-cost traffic analysis of Tor
    • Paxson, V., Waidner, M. (eds.), IEEE Computer Society, Berkeley
    • Murdoch, S., Danezis, G.: Low-Cost Traffic Analysis of Tor. In: Paxson, V., Waidner, M. (eds.) 2005 IEEE Symposium on Security and Privacy, pp. 183-195. IEEE Computer Society, Berkeley (2005), http://ieeexplore.ieee.org/lpdocs/ epic03/wrapper.htm?arnumber=1425067
    • (2005) 2005 IEEE Symposium on Security and Privacy , pp. 183-195
    • Murdoch, S.1    Danezis, G.2
  • 20
    • 0344152271 scopus 로고    scopus 로고
    • Bandwidth estimation: Metrics, measurement techniques, and tools
    • Prasad, R., Davrolis, C., Murray, M., Claffy, K.: Bandwidth estimation: metrics, measurement techniques, and tools. IEEE Network 17(6), 27-35 (2003), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1248658
    • (2003) IEEE Network , vol.17 , Issue.6 , pp. 27-35
    • Prasad, R.1    Davrolis, C.2    Murray, M.3    Claffy, K.4
  • 21
    • 0038041177 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection
    • Samarati, P. (ed.), ACM Press, New York
    • Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. In: Samarati, P. (ed.) ACMWorkshop on Privacy in Electronic Society, pp. 91-102. ACM Press, New York (2002), http://portal.acm.org/citation.cfm?id=644537
    • (2002) ACMWorkshop on Privacy in Electronic Society , pp. 91-102
    • Rennhard, M.1    Plattner, B.2
  • 23
    • 0030832833 scopus 로고    scopus 로고
    • Dummynet: A simple approach to the evaluation of network protocols
    • Rizzo, L.: Dummynet: a simple approach to the evaluation of network protocols. ACM SIGCOMM Computer Communication Review 27(1), 31-41 (1997), http://portal.acm.org/citation.cfm?doid=251007.251012
    • (1997) ACM SIGCOMM Computer Communication Review , vol.27 , Issue.1 , pp. 31-41
    • Rizzo, L.1
  • 24
    • 0017930815 scopus 로고
    • Dynamic programming algorithm optimization for spoken word recognition
    • Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing 26(1), 43-49 (1978), http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber=1163055
    • (1978) IEEE Transactions on Acoustics, Speech, and Signal Processing , vol.26 , Issue.1 , pp. 43-49
    • Sakoe, H.1    Chiba, S.2
  • 25
    • 78650117270 scopus 로고    scopus 로고
    • Devices that tell on you: Privacy trends in consumer ubiquitous computing
    • Provos, N. (ed.), USENIX Association
    • Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: Privacy trends in consumer ubiquitous computing. In: Provos, N. (ed.) 16th USENIX Security Symposium, pp. 55-70. USENIX Association (2007), http://portal.acm.org/citation.cfm?id=1362908
    • (2007) 16th USENIX Security Symposium , pp. 55-70
    • Saponas, T.S.1    Lester, J.2    Hartung, C.3    Agarwal, S.4    Kohno, T.5
  • 26
    • 0030171894 scopus 로고    scopus 로고
    • Efficient fair queuing using deficit round-robin
    • Shreedhar, M., Varghese, G.: Efficient fair queuing using deficit round-robin. IEEE/ACM Transactions on Networking 4(3), 375-385 (1996), http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=502236
    • (1996) IEEE/ACM Transactions on Networking , vol.4 , Issue.3 , pp. 375-385
    • Shreedhar, M.1    Varghese, G.2
  • 27
    • 85084161110 scopus 로고    scopus 로고
    • Timing analysis of keystrokes and SSH timing attacks
    • Wallach, D.S. (ed.), USENIX Association, August
    • Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and SSH timing attacks. In: Wallach, D.S. (ed.) 10th USENIX Security Symposium. USENIX Association (August 2001), http://www.usenix.org/events/sec01/song.html
    • (2001) 10th USENIX Security Symposium
    • Song, D.X.1    Wagner, D.2    Tian, X.3
  • 28
    • 19544387793 scopus 로고    scopus 로고
    • A measurement study of available bandwidth estimation tools
    • Crovella, M. (ed.), ACM, New York
    • Strauss, J., Katabi, D., Kaashoek, F.: A measurement study of available bandwidth estimation tools. In: Crovella, M. (ed.) 3rd ACM SIGCOMM Conference on Internet Measurement, pp. 39-44. ACM, New York (2003), http://portal.acm.org/ citation.cfm?id=948211
    • (2003) 3rd ACM SIGCOMM Conference on Internet Measurement , pp. 39-44
    • Strauss, J.1    Katabi, D.2    Kaashoek, F.3
  • 29
    • 0036086129 scopus 로고    scopus 로고
    • Statistical identification of encrypted Web browsing traffic
    • Abadi, M., Bellovin, S.M. (eds.), IEEE Computer Society, May
    • Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted Web browsing traffic. In: Abadi, M., Bellovin, S.M. (eds.) IEEE Symposium on Security and Privacy, pp. 19-30. IEEE Computer Society (May 2002), http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=1004359
    • (2002) IEEE Symposium on Security and Privacy , pp. 19-30
    • Sun, Q.1    Simon, D.R.2    Wang, Y.M.3    Russell, W.4    Padmanabhan, V.N.5    Qiu, L.6
  • 30
    • 84946432389 scopus 로고    scopus 로고
    • Analysis of the SSL 3.0 protocol
    • Tygar, D. (ed.), USENIX Association, November
    • Wagner, D., Schneier, B.: Analysis of the SSL 3.0 Protocol. In: Tygar, D. (ed.) USENIX Workshop on Electronic Commerce. USENIX Association (November 1996), http://www.usenix.org/publications/library/proceedings/ec96/wagner.html
    • (1996) USENIX Workshop on Electronic Commerce
    • Wagner, D.1    Schneier, B.2
  • 31
  • 32
    • 50249140706 scopus 로고    scopus 로고
    • Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
    • IEEE Computer Society, Washington, DC
    • Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In: IEEE Symposium on Security and Privacy, pp. 35-49. IEEE Computer Society, Washington, DC (2008), http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=4531143
    • (2008) IEEE Symposium on Security and Privacy , pp. 35-49
    • Wright, C.V.1    Ballard, L.2    Coull, S.E.3    Monrose, F.4    Masson, G.M.5
  • 34
    • 79959957319 scopus 로고    scopus 로고
    • Peeping Tom in the neighborhood: Keystroke eavesdropping on multi-user systems
    • Monrose, F. (ed.), USENIX Association, August
    • Zhang, K., Wang, X.: Peeping Tom in the neighborhood: Keystroke eavesdropping on multi-user systems. In: Monrose, F. (ed.) 18th USENIX Security Symposium USENIX Security. USENIX Association (August 2009), http://www.usenix.org/events/sec09/tech/full-papers/zhang.pdf
    • (2009) 18th USENIX Security Symposium USENIX Security
    • Zhang, K.1    Wang, X.2
  • 35
    • 33746081314 scopus 로고    scopus 로고
    • Unmixing mix traffic
    • Danezis, G., Martin, D. (eds.), LNCS, Springer, Heidelberg
    • Zhu, Y., Bettati, R.: Unmixing Mix Traffic. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 110-127. Springer, Heidelberg (2006)
    • (2006) PET 2005 , vol.3856 , pp. 110-127
    • Zhu, Y.1    Bettati, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.