메뉴 건너뛰기




Volumn , Issue , 2006, Pages 189-197

ABC: Adaptive bank-transaction camouflaging systems

Author keywords

Bank security; Camouflaging; NetCamo; TCP; Traffic analysis

Indexed keywords

BANK SECURITY; CAMOUFLAGING; NETCAMO; TCP; TRAFFIC ANALYSIS;

EID: 84896259674     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (26)
  • 1
    • 84896294460 scopus 로고
    • Comptroller of the Currency Administer of National Banks, Payment Systems and Funds Transfer Activities
    • Anonymous (1990) "Comptroller of the Currency Administer of National Banks, Payment Systems and Funds Transfer Activities", Comptroller's Handbook.
    • (1990) Comptroller's Handbook
  • 2
    • 84896267128 scopus 로고
    • Computers & operations: consolidation, truncation mark Fed operations strategy
    • I. New York: August
    • Anonymous (1992) "Computers & operations: consolidation, truncation mark Fed operations strategy". American Bankers Association. I. New York: August, Vol. 84, Iss. 8, p. 58.
    • (1992) American Bankers Association , vol.84 , Issue.8 , pp. 58
  • 3
    • 84896262010 scopus 로고    scopus 로고
    • Presidential Decision Directive 63, Critical Infrastructure Protection: Sector Coordinators
    • Presidential Decision Directive 63, Federal Register, 5 August
    • Anonymous (1998) "Presidential Decision Directive 63, Critical Infrastructure Protection: Sector Coordinators, Presidential Decision Directive 63, Federal Register 63, no. 150 (5 August): 41804.
    • (1998) , vol.63 , Issue.150 , pp. 41804
  • 4
    • 84896275388 scopus 로고    scopus 로고
    • Board of Governors from the Federal Reserve Bank
    • [online], MCIL
    • Anonymous (2005) "Board of Governors from the Federal Reserve Bank", [online], MCIL, http://www.federalreserve.gov, 2005.
    • (2005)
  • 5
    • 80053140625 scopus 로고    scopus 로고
    • The netfilter / iptables project
    • [online], MCIL, Netfilter
    • Anonymous (2005) "The netfilter / iptables project", [online], MCIL, Netfilter. http://netfilter.samba.org/.
    • (2005)
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • Chaum, D. (1981) "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, vol. 4, no. 2, February.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 9
    • 33644950551 scopus 로고    scopus 로고
    • The Federal Reserve System: Purposes & Functions
    • Ninth Edition, June, 2005
    • Fox, L. (2005) "The Federal Reserve System: Purposes & Functions", Ninth Edition, June 2005.
    • (2005)
    • Fox, L.1
  • 10
    • 0003866461 scopus 로고    scopus 로고
    • Packet-level traffic measurements from a tier-1 ip backbone
    • Technical report, Sprint
    • Fraleigh, C., Moon, S., Diot, C., Lyles, B., & Tobagi, F. (2001) "Packet-level traffic measurements from a tier-1 ip backbone", Technical report, Sprint.
    • (2001)
    • Fraleigh, C.1    Moon, S.2    Diot, C.3    Lyles, B.4    Tobagi, F.5
  • 12
    • 84896269018 scopus 로고    scopus 로고
    • Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
    • 6th Information Hiding Workshop (IH), May 23~25, Toronto, Ontario, Canada
    • Fu, X., Graham, B., Xuan, D., Bettati, R., & Zhao, W. (2004) "Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures", 6th Information Hiding Workshop (IH), May 23~25, Toronto, Ontario, Canada.
    • (2004)
    • Fu, X.1    Graham, B.2    Xuan, D.3    Bettati, R.4    Zhao, W.5
  • 14
    • 0004216472 scopus 로고    scopus 로고
    • Network Security: Private Communication in a Public World
    • Second Edition, Prentice Hall PTR
    • Kaufman, C., Perlman, R., & Speciner, M. (2002) Network Security: Private Communication in a Public World, Second Edition, Prentice Hall PTR.
    • (2002)
    • Kaufman, C.1    Perlman, R.2    Speciner, M.3
  • 16
    • 85065559785 scopus 로고
    • Performance analysis of a method for high level prevention of traffic analysis
    • Eighth Annual
    • Newman-Wolfe, R.E. & Venkatraman, B.R. (1992) "Performance analysis of a method for high level prevention of traffic analysis", Computer Security Applications Conference, Eighth Annual, pages 123~130.
    • (1992) Computer Security Applications Conference
    • Newman-Wolfe, R.E.1    Venkatraman, B.R.2
  • 17
    • 0028713303 scopus 로고
    • Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
    • 10th Annual
    • Newman-Wolfe, R.E. & Venkatraman, B.R. (1994) "Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network", Computer Security Applications Conference, 10th Annual, pages 288 ~297.
    • (1994) Computer Security Applications Conference
    • Newman-Wolfe, R.E.1    Venkatraman, B.R.2
  • 18
    • 84896308206 scopus 로고    scopus 로고
    • E-checks pace ACH growth, American Bankers Association
    • New York, June
    • Orr, B. (2004) "E-checks pace ACH growth, American Bankers Association", ABA Banking Journal. New York:. 96(6), p. 72, June.
    • (2004) ABA Banking Journal , vol.96 , Issue.6 , pp. 72
    • Orr, B.1
  • 19
    • 84896258954 scopus 로고    scopus 로고
    • Security in Banking Computer Security Reference Book
    • Butterworth Heinemann
    • Pugh, B. Security in Banking Computer Security Reference Book, Butterworth Heinemann.
    • Pugh, B.1
  • 20
    • 1842595638 scopus 로고    scopus 로고
    • Linux netfilter Hacking HOWTO
    • [online], MCIL
    • Russell, R. & Welte, H. (2002) "Linux netfilter Hacking HOWTO", [online], MCIL, http://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO-1.html#ss1.1
    • (2002)
    • Russell, R.1    Welte, H.2
  • 21
    • 0031274649 scopus 로고    scopus 로고
    • Wide-area internet traffic patterns and characteristics
    • November/December
    • Thompson, K., Miller, G., & Wilder, R. (1997), "Wide-area internet traffic patterns and characteristics", IEEE Network magazine, 11(6), November/December.
    • (1997) IEEE Network magazine , vol.11 , Issue.6
    • Thompson, K.1    Miller, G.2    Wilder, R.3
  • 22
    • 84872245123 scopus 로고    scopus 로고
    • Why TCP over TCP is a bad idea
    • [online], MCIL
    • Titz, O. (1996) "Why TCP over TCP is a bad idea", [online], MCIL, http://sites.inka.de/sites/bigred/devel/tcp-tcp.html.
    • (1996)
    • Titz, O.1
  • 23
    • 84896265765 scopus 로고    scopus 로고
    • Bank for International Settlement: Committee on Payment and Settlement Systems, Payment and Settlement Systems in Selected Countries
    • Press & Communications
    • Tommaso, P. (2003) "Bank for International Settlement: Committee on Payment and Settlement Systems, Payment and Settlement Systems in Selected Countries", Press & Communications.
    • (2003)
    • Tommaso, P.1
  • 24
    • 84896264671 scopus 로고
    • Monetary Policy and Credit Availability Effects of Electronic Funds Transfers
    • Seattle: Spring
    • Tucker, D. (1978) "Monetary Policy and Credit Availability Effects of Electronic Funds Transfers", Journal of Contemporary Business, Seattle: Spring, 7(2), p. 149.
    • (1978) Journal of Contemporary Business , vol.7 , Issue.2 , pp. 149
    • Tucker, D.1
  • 25
    • 84896264072 scopus 로고
    • Security mechanisms in high-level network protocols
    • Voydoc, V. and Kent, S. (1983) Security mechanisms in high-level network protocols.
    • (1983)
    • Voydoc, V.1    Kent, S.2
  • 26
    • 34250785454 scopus 로고    scopus 로고
    • On Flow Correlation Attacks and Countermeasures in Mix Networks
    • Workshop on Privacy Enhancing Technologies (PET), Toronto, Canada, May 26-28
    • Zhu, Y., Fu, X., Graham, B., Bettati, R., & Zhao, W. (2004) "On Flow Correlation Attacks and Countermeasures in Mix Networks", Workshop on Privacy Enhancing Technologies (PET), Toronto, Canada, May 26-28
    • (2004)
    • Zhu, Y.1    Fu, X.2    Graham, B.3    Bettati, R.4    Zhao, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.