메뉴 건너뛰기




Volumn 62, Issue 12, 2013, Pages 2411-2426

Novel packet size-based covert channel attacks against anonymizer

Author keywords

Anonymizer; TCP dynamics; Watermark

Indexed keywords

ANONYMIZER; ANONYMOUS COMMUNICATION SYSTEMS; COVERT CHANNELS; EXPERIMENTAL EVALUATION; HURST PARAMETER; MONTE CARLO SAMPLING TECHNIQUE; ROBUST ALGORITHM; WEB OBJECTS;

EID: 84887958680     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2012.169     Document Type: Article
Times cited : (27)

References (44)
  • 6
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • May
    • X. Wang, S. Chen, and S. Jajodia, "Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems," Proc. IEEE Symp. Security & Privacy (S&P), May 2007.
    • (2007) Proc. IEEE Symp. Security & Privacy (S&P)
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 17
    • 84887968867 scopus 로고    scopus 로고
    • Anonymizer, Inc., http://www.anonymizer.com/, 2011.
    • (2011)
  • 23
    • 0000759022 scopus 로고
    • Long term storage capacity of reservoirs
    • H.E. Hurst, "Long Term Storage Capacity of Reservoirs," Trans. Am. Soc. Civil Engineers, vol. 116, pp. 770-799, 1951.
    • (1951) Trans. Am. Soc. Civil Engineers. , vol.116 , pp. 770-799
    • Hurst, H.E.1
  • 24
    • 83055172515 scopus 로고    scopus 로고
    • A practical guide to measuring the hurst parameter
    • Workshop
    • R.G. Clegg, "A Practical Guide to Measuring the Hurst Parameter," Proc. 21st UK Performance Eng. Workshop, 2005.
    • (2005) Proc. 21st UK Performance Eng.
    • Clegg, R.G.1
  • 25
    • 0000501589 scopus 로고
    • Fractional brownian motions, fractional noises and applications
    • Oct
    • B.B. Mandelbrot and J.W.V. Ness, "Fractional Brownian Motions, Fractional Noises and Applications," Soc. Industrial and Applied Math., vol. 10, no. 4, pp. 422-437, Oct. 1968.
    • (1968) Soc. Industrial and Applied Math. , vol.10 , Issue.4 , pp. 422-437
    • Mandelbrot, B.B.1    Ness, J.W.V.2
  • 28
    • 0033356590 scopus 로고    scopus 로고
    • A behavioral model of web traffic
    • Network Protocols (ICNP) Sept
    • H.-K. Choi and J.O. Limb, A Behavioral Model of Web Traffic," Proc. IEEE Int'l Conf. Network Protocols (ICNP), Sept. 1999.
    • (1999) Proc. IEEE Int'l Conf.
    • Choi, H.-K.1    Limb, J.O.2
  • 31
    • 84887885580 scopus 로고    scopus 로고
    • W. Dai, "Pipenet 1.1," http://weidai.com/pipenet.txt, 2011.
    • (2011)
    • Dai, W.1
  • 35
    • 84887899205 scopus 로고    scopus 로고
    • "Pen," http://siag.nu/pen, 2011.
    • (2011) Pen
  • 36
    • 84861584767 scopus 로고    scopus 로고
    • "Adobe Flash Player," http://www.adobe.com/products/ flashplayer/, 2011.
    • (2011) Adobe Flash Player
  • 42
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter- packet delays
    • Nov
    • X. Wang and D.S. Reeves, "Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Manipulation of Inter- Packet Delays," Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2003.
    • (2003) Proc. ACM Conf. Computer and Comm. Security (CCS)
    • Wang, X.1    Reeves, D.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.