메뉴 건너뛰기




Volumn , Issue , 2007, Pages 95-116

Introducing traffic analysis

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84865507939     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (22)

References (77)
  • 5
    • 85056511317 scopus 로고
    • British Ruse Held Iraqi’s Attention While Real Invasion Came Elsewhere
    • 3 March
    • Fullerton, J., British Ruse Held Iraqi’s Attention While Real Invasion Came Elsewhere, The Philadelphia Inquirer, 3 March 1991.
    • (1991) The Philadelphia Inquirer
    • Fullerton, J.1
  • 6
    • 85056548539 scopus 로고    scopus 로고
    • Planespotting: Nerds with binoculars bust the CIA’s torture taxis
    • 15 October
    • Paglen, T. and Thompson, A.C., Planespotting: Nerds with binoculars bust the CIA’s torture taxis, The Village Voice, 15 October, 2006.
    • (2006) The Village Voice
    • Paglen, T.1    Thompson, A.C.2
  • 9
    • 0001504032 scopus 로고
    • An experimental study of the small world problem
    • Travers, J. and Milgram, S., An experimental study of the small world problem, Sociometry, 32, 1969.
    • (1969) Sociometry , pp. 32
    • Travers, J.1    Milgram, S.2
  • 11
    • 84917038100 scopus 로고    scopus 로고
    • A brief introduction to scale-free networks
    • Department of Mathematics and Statistics, University of Victoria, British Columbia
    • Reed, W.J., A brief introduction to scale-free networks, Technical report, Department of Mathematics and Statistics, University of Victoria, British Columbia, 2004.
    • (2004) Technical report
    • Reed, W.J.1
  • 13
    • 7644231652 scopus 로고    scopus 로고
    • Leaderless resistance today
    • Garfinkel, S.L., Leaderless resistance today, First Monday, 3, 2003.
    • (2003) First Monday , pp. 3
    • Garfinkel, S.L.1
  • 14
    • 48649088885 scopus 로고    scopus 로고
    • The topology of covert conflict
    • University of Cambridge, Computer Laboratory
    • Nagaraja, S. and Anderson, R., The topology of covert conflict, Technical Report UCAM-CL-TR-637, University of Cambridge, Computer Laboratory, 2005.
    • (2005) Technical Report UCAM-CL-TR-637
    • Nagaraja, S.1    Anderson, R.2
  • 15
    • 0012254042 scopus 로고
    • The application of network analysis to criminal intelligence: An assessment of the prospects
    • Sparrow, M.K., The application of network analysis to criminal intelligence: An assessment of the prospects, Social Networks, 13, 251, 1991.
    • (1991) Social Networks , vol.13 , pp. 251
    • Sparrow, M.K.1
  • 16
    • 0242465495 scopus 로고    scopus 로고
    • The network paradigm applied to criminal organisations
    • Klerks, P., The network paradigm applied to criminal organisations, Connections, 24, 53, 2001.
    • (2001) Connections , vol.24 , pp. 53
    • Klerks, P.1
  • 18
    • 34547152602 scopus 로고    scopus 로고
    • U.S. Army, Washington, D.C
    • U.S. Army Headquarters Department, Field Manual 3-24: Counterinsurgency, U.S. Army, Washington, D.C., 2006.
    • (2006) Field Manual 3-24: Counterinsurgency
  • 19
    • 7644224668 scopus 로고    scopus 로고
    • Uncloaking terrorist networks
    • Krebs, V.E., Uncloaking terrorist networks, First Monday, 7, 2002.
    • (2002) First Monday , pp. 7
    • Krebs, V.E.1
  • 24
    • 0003780986 scopus 로고    scopus 로고
    • The pagerank citation ranking: Bringing order to the web
    • Stanford Digital Library Technologies Project
    • Page, L. et al., The pagerank citation ranking: Bringing order to the web, Technical report, Stanford Digital Library Technologies Project, 1998.
    • (1998) Technical report
    • Page, L.1
  • 25
    • 84893721621 scopus 로고    scopus 로고
    • Hubs, authorities, and communities
    • Kleinberg, J.M., Hubs, authorities, and communities, ACM Computing Surveys, 31, 5, 1999.
    • (1999) ACM Computing Surveys , vol.31 , pp. 5
    • Kleinberg, J.M.1
  • 27
    • 85084161110 scopus 로고    scopus 로고
    • Timing analysis of keystrokes and timing attacks on SSH
    • USENIX, Washington, D.C
    • Song, D.X., Wagner, D., and Tian, X., Timing analysis of keystrokes and timing attacks on SSH, in Tenth USENIX Security Symposium, USENIX, Washington, D.C., 2001.
    • (2001) Tenth USENIX Security Symposium
    • Song, D.X.1    Wagner, D.2    Tian, X.3
  • 30
    • 84957796461 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • R. Dingledine and P.F. Syverson, Eds, Springer-Verlag, Heidelberg, Germany
    • Hintz, A., Fingerprinting websites using traffic analysis, in R. Dingledine and P.F. Syverson, Eds., Privacy Enhancing Technologies, vol. 2482 of Lecture Notes in Computer Science, 171, Springer-Verlag, Heidelberg, Germany, 2002.
    • (2002) Privacy Enhancing Technologies, vol. 2482 of Lecture Notes in Computer Science , pp. 171
    • Hintz, A.1
  • 31
    • 0036086129 scopus 로고    scopus 로고
    • Statistical identification of encrypted web browsing traffic
    • IEEE Computer Security Press, Los Alamitos, CA
    • Sun, Q. et al., Statistical identification of encrypted web browsing traffic, in IEEE Symposium on Security and Privacy, 19, IEEE Computer Security Press, Los Alamitos, CA, 2002.
    • (2002) IEEE Symposium on Security and Privacy , pp. 19
    • Sun, Q.1
  • 33
    • 38549152519 scopus 로고    scopus 로고
    • Privacy vulnerabilities in encrypted HTTP streams
    • G. Danezis and D. Martin, Eds, Springer-Verlag, Heidelberg, Germany
    • Bissias, G.D. et al., Privacy vulnerabilities in encrypted HTTP streams, in G. Danezis and D. Martin, Eds., Privacy Enhancing Technologies, vol. 3856 of Lecture Notes in Computer Science, 1, Springer-Verlag, Heidelberg, Germany, 2005.
    • (2005) Privacy Enhancing Technologies, vol. 3856 of Lecture Notes in Computer Science , pp. 1
    • Bissias, G.D.1
  • 37
    • 34547339276 scopus 로고    scopus 로고
    • Hot or not: Revealing hidden services by their clock skew
    • A. Juels, R.N.Wright, and S.D.C. di Vimercati, Eds, Alexandria, VA, ACM Press, New York
    • Murdoch, S.J., Hot or not: Revealing hidden services by their clock skew, in A. Juels, R.N.Wright, and S.D.C. di Vimercati, Eds., 13th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, 27, ACM Press, New York, 2006.
    • (2006) 13th ACM Conference on Computer and Communications Security (CCS) , pp. 27
    • Murdoch, S.J.1
  • 39
    • 0141762463 scopus 로고    scopus 로고
    • A technique for counting NATted hosts
    • ACM Press, New York
    • Bellovin, S.M., A technique for counting NATted hosts, in Internet Measurement Workshop, 267, ACM Press, New York, 2002.
    • (2002) Internet Measurement Workshop , pp. 267
    • Bellovin, S.M.1
  • 42
    • 85056553125 scopus 로고    scopus 로고
    • Privacy extensions for stateless address autoconfiguration in IPv6-“requirements for unobservability,”
    • Stockholm
    • Pascual, A.E., Privacy extensions for stateless address autoconfiguration in IPv6-“requirements for unobservability,” in RVP02, Stockholm, Stockholm, 2002.
    • (2002) RVP02, Stockholm
    • Pascual, A.E.1
  • 44
    • 85056500595 scopus 로고    scopus 로고
    • Snort team, Snort, http://www.snort.org/.
    • Snort
  • 45
    • 85056502794 scopus 로고    scopus 로고
    • Fyodor, Nmap manual, 2006, http://www.insecure.org/nmap/man/.
    • (2006) Nmap manual
    • Fyodor1
  • 46
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • S. Jajodia, V. Atluri, and T. Jaeger, Eds, ACM Press, New York
    • Wang, X. and Reeves, D.S., Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays, in S. Jajodia, V. Atluri, and T. Jaeger, Eds., ACM Conference on Computer and Communications Security, 20, ACM Press, New York, 2003.
    • (2003) ACM Conference on Computer and Communications Security , pp. 20
    • Wang, X.1    Reeves, D.S.2
  • 47
    • 35048846490 scopus 로고    scopus 로고
    • Detection of interactive stepping stones: Algorithms and confidence bounds
    • E. Jonsson, A. Valdes, and M. Almgren, Eds, Springer-Verlag, Heidelberg, Germany
    • Blum, A., Song, D.X., and Venkataraman, S., Detection of interactive stepping stones: Algorithms and confidence bounds, in E. Jonsson, A. Valdes, and M. Almgren, Eds., RAID, vol. 3224 of Lecture Notes in Computer Science, 258, Springer-Verlag, Heidelberg, Germany, 2004.
    • (2004) RAID, vol. 3224 of Lecture Notes in Computer Science , pp. 258
    • Blum, A.1    Song, D.X.2    Venkataraman, S.3
  • 48
    • 84957003012 scopus 로고    scopus 로고
    • Inter-packet delay-based correlation for tracing encrypted connections through stepping stones
    • D. Gollmann, G. Karjoth, and M. Waidner, Eds, Springer-Verlag, Heidelberg, Germany
    • Wang, X., Reeves, D.S., and Wu, S.F., Inter-packet delay-based correlation for tracing encrypted connections through stepping stones, in D. Gollmann, G. Karjoth, and M. Waidner, Eds., ESORICS, vol. 2502 of Lecture Notes in Computer Science, 244, Springer-Verlag, Heidelberg, Germany, 2002.
    • (2002) ESORICS, vol. 2502 of Lecture Notes in Computer Science , pp. 244
    • Wang, X.1    Reeves, D.S.2    Wu, S.F.3
  • 49
    • 33751040560 scopus 로고    scopus 로고
    • On the secrecy of timing-based active watermarking trace-back techniques
    • IEEE Computer Society Press, Los Alamitos, CA
    • Peng, P., Ning, P., and Reeves, D.S., On the secrecy of timing-based active watermarking trace-back techniques, in S&P 2006 [?], IEEE Computer Society Press, Los Alamitos, CA, 334.
    • S&P 2006 [?] , pp. 334
    • Peng, P.1    Ning, P.2    Reeves, D.S.3
  • 51
    • 38349013851 scopus 로고    scopus 로고
    • MIT Media Lab Human Dynamics Group, Reality mining, http://reality.media.mit.edu/.
    • Reality mining
  • 52
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D., Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, 24, 84, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84
    • Chaum, D.1
  • 53
    • 33646064357 scopus 로고    scopus 로고
    • Designing and attacking anonymous communication systems
    • University of Cambridge, Computer Laboratory
    • Danezis, G., Designing and attacking anonymous communication systems, Technical Report UCAM-CL-TR-594, University of Cambridge, Computer Laboratory, 2004.
    • (2004) Technical Report UCAM-CL-TR-594
    • Danezis, G.1
  • 54
    • 31844450130 scopus 로고    scopus 로고
    • On the anonymity of anonymity systems
    • University of Cambridge, Computer Laboratory
    • Serjantov, A., On the anonymity of anonymity systems, Technical Report UCAM-CL-TR-604, University of Cambridge, Computer Laboratory, 2004.
    • (2004) Technical Report UCAM-CL-TR-604
    • Serjantov, A.1
  • 57
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A system for anonymous and unobservable Internet access
    • H. Federrath, Ed., Springer-Verlag, Heidelberg, Germany
    • Berthold, O., Federrath, H., and Köpsell, S., Web MIXes: A system for anonymous and unobservable Internet access, in H. Federrath, Ed., Designing Privacy Enhancing Technologies, vol. 2009 of LNCS, 115, Springer-Verlag, Heidelberg, Germany, 2000.
    • (2000) Designing Privacy Enhancing Technologies, vol. 2009 of LNCS , pp. 115
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 58
  • 62
    • 85180737609 scopus 로고    scopus 로고
    • An analysis of the degradation of anonymous protocols
    • The Internet Society
    • Wright, M. et al., An analysis of the degradation of anonymous protocols, in NDSS, The Internet Society, 2002.
    • (2002) NDSS
    • Wright, M.1
  • 64
    • 85056495458 scopus 로고
    • And bomb the anchovies
    • 13 August
    • Gray, P., And bomb the anchovies, Time, 13 August, 1990.
    • (1990) Time
    • Gray, P.1
  • 66
    • 0030642878 scopus 로고    scopus 로고
    • Probable plaintext cryptanalysis of the IP security protocols
    • IEEE Computer Society Press, Los Alamitos, CA
    • Bellovin, S.M., Probable plaintext cryptanalysis of the IP security protocols, in NDSS, IEEE Computer Society Press, Los Alamitos, CA, 1997.
    • (1997) NDSS
    • Bellovin, S.M.1
  • 70
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • Voydock, V. and Kent, S., Security mechanisms in high-level network protocols, ACM Computing Surveys (CSUR), 15, 135, 1983.
    • (1983) ACM Computing Surveys (CSUR) , vol.15 , pp. 135
    • Voydock, V.1    Kent, S.2
  • 73
    • 0006890169 scopus 로고    scopus 로고
    • Efficient traffic camouflaging in mission-critical QoSguaranteed networks
    • IEEE Computer Society Press, Los Alamitos, CA
    • Guan, Y. et al., Efficient traffic camouflaging in mission-critical QoSguaranteed networks, in Proceedings of IEEE Information Assurance and Security Workshop, West Point, June 2000, 143, IEEE Computer Society Press, Los Alamitos, CA, 2000.
    • (2000) Proceedings of IEEE Information Assurance and Security Workshop, West Point, June 2000 , pp. 143
    • Guan, Y.1
  • 74
    • 0035402083 scopus 로고    scopus 로고
    • Netcamo: Camouflaging network traffic for QoS-guaranteed mission critical applications
    • Guan, Y. et al., Netcamo: Camouflaging network traffic for QoS-guaranteed mission critical applications, IEEE Transactions on Systems, Man, and Cybernetics, Part A, 31, 253, 2001.
    • (2001) IEEE Transactions on Systems, Man, and Cybernetics, Part A , vol.31 , pp. 253
    • Guan, Y.1
  • 75
    • 85056549806 scopus 로고    scopus 로고
    • Towards a U.S. data-retention standard for ISPs
    • Petersen, R., Towards a U.S. data-retention standard for ISPs, Educause Review, 41, 78, 2006.
    • (2006) Educause Review , vol.41 , pp. 78
    • Petersen, R.1
  • 77
    • 44349151297 scopus 로고    scopus 로고
    • Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC
    • European Union, Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC, Official Journal of the European Union, L 105, 54, 2006.
    • (2006) Official Journal of the European Union , vol.L 105 , pp. 54


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.