메뉴 건너뛰기




Volumn , Issue , 2013, Pages 131-140

Revisiting circuit clogging attacks on tor

Author keywords

Anonymity; Attack; Circuit Clogging; Privacy; Tor

Indexed keywords

ANONYMITY; ATTACK; BURST PERIOD; DETECTION MECHANISM; DETECTION SCHEME; NETWORK LATENCIES; PROCESSING TIME; TOR;

EID: 84892383749     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2013.17     Document Type: Conference Paper
Times cited : (17)

References (27)
  • 4
    • 84892390419 scopus 로고    scopus 로고
    • I2P anonymous network
    • "I2P anonymous network," http://www.i2p2.de/.
  • 8
    • 35048897629 scopus 로고    scopus 로고
    • Practical anonymity for the masses with morphmix
    • A. Juels, Ed. Springer-Verlag, LNCS, February 2004
    • -, "Practical anonymity for the masses with morphmix," in Proceedings of Financial Cryptography (FC '04), A. Juels, Ed. Springer-Verlag, LNCS 3110, February 2004, pp. 233-250.
    • (3110) Proceedings of Financial Cryptography (FC '04) , pp. 233-250
    • Rennhard, M.1    Plattner, B.2
  • 9
    • 84892377449 scopus 로고    scopus 로고
    • "Tor," https://www.torproject.org/.
  • 11
    • 84892430477 scopus 로고    scopus 로고
    • Tor metrics portal
    • "Tor metrics portal," https://metrics.torproject.org/.
  • 14
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and tradeoffs in anonymity providing systems
    • I. S. Moskowitz, Ed. Springer-Verlag April
    • A. Back, U. Moller, and A. Stiglic, "Traffic analysis attacks and tradeoffs in anonymity providing systems," in Proceedings of Information Hiding Workshop (IH 2001), I. S. Moskowitz, Ed. Springer-Verlag, LNCS 2137, April 2001, pp. 245-257.
    • (2001) Proceedings of Information Hiding Workshop (IH 2001), , LNCS 2137 , pp. 245-257
    • Back, A.1    Moller, U.2    Stiglic, A.3
  • 16
    • 70349301114 scopus 로고    scopus 로고
    • Timing analysis in low-latency mix networks: Attacks and defenses
    • September
    • V. Shmatikov and M.-H. Wang, "Timing analysis in low-latency mix networks: Attacks and defenses," in Proceedings of ESORICS 2006, September 2006.
    • (2006) Proceedings of ESORICS 2006
    • Shmatikov, V.1    Wang, M.-H.2
  • 20
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • may
    • X. Wang, S. Chen, and S. Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems," in IEEE Symposium on Security and Privacy, may 2007, pp. 116-130.
    • (2007) IEEE Symposium on Security and Privacy , pp. 116-130
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 23
    • 84892379242 scopus 로고    scopus 로고
    • "BitTorrent," http://www.bittorrent.com/.
  • 25
    • 74049120310 scopus 로고    scopus 로고
    • Don't clog the queue: Circuit clogging and mitigation in P2P anonymity schemes
    • January
    • J. McLachlan and N. Hopper, "Don't clog the queue: Circuit clogging and mitigation in P2P anonymity schemes," in Proceedings of Financial Cryptography (FC '08), January 2008.
    • (2008) Proceedings of Financial Cryptography (FC '08)
    • McLachlan, J.1    Hopper, N.2
  • 26
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to roc analysis
    • Jun
    • T. Fawcett, "An introduction to roc analysis," Pattern Recogn. Lett., vol. 27, no. 8, pp. 861-874, Jun. 2006.
    • (2006) Pattern Recogn. Lett , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1
  • 27
    • 84892419518 scopus 로고    scopus 로고
    • "Amazon EC2," http://aws.amazon.com/ec2/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.