메뉴 건너뛰기




Volumn , Issue , 2003, Pages 31-39

Active traffic analysis attacks and countermeasures

Author keywords

Entropy; Information analysis; Information security; Internet; Mission critical systems; Pattern analysis; Payloads; Statistical analysis; Telecommunication traffic; Wire

Indexed keywords

ENTROPY; INFORMATION ANALYSIS; INTERNET; MOBILE COMPUTING; SECURITY OF DATA; STATISTICAL METHODS; TELECOMMUNICATION TRAFFIC; WIRE;

EID: 84946149882     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCNMC.2003.1243024     Document Type: Conference Paper
Times cited : (27)

References (35)
  • 1
    • 84944727698 scopus 로고    scopus 로고
    • 8
    • Onion Routing Development Achives. Link padding and the intersection attack. http://archives.seul.org/or/dev/Aug-2002/msg00004.html, 8 2002.
    • (2002) Link Padding and the Intersection Attack
  • 4
    • 23544462875 scopus 로고    scopus 로고
    • June
    • CAIDA. Packet sizes and sequencing. http://www.caida.org/outreach/resources/learn/packetsizes/, June 2002.
    • (2002) Packet Sizes and Sequencing
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb.
    • D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), Feb. 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2
    • Chaum, D.L.1
  • 10
    • 0037629738 scopus 로고    scopus 로고
    • On effectiveness of link padding for statistical traffic analysis attacks
    • Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao. On effectiveness of link padding for statistical traffic analysis attacks. ICDCS, 2003.
    • (2003) ICDCS
    • Fu, X.1    Graham, B.2    Bettati, R.3    Zhao, W.4
  • 14
    • 84946138370 scopus 로고    scopus 로고
    • SafeWeb inc. Safeweb. http://www.safewebinc.com/, 2002.
    • (2002) Safeweb
  • 17
    • 0024621174 scopus 로고
    • On estimation of entropy and mutual information of continuous distributions
    • R. Moddemeijer. On estimation of entropy and mutual information of continuous distributions. Signal Processing, 16(3):233-246, 1989.
    • (1989) Signal Processing , vol.16 , Issue.3 , pp. 233-246
    • Moddemeijer, R.1
  • 22
    • 0013379958 scopus 로고    scopus 로고
    • NIST/SEMATECH. Handbook of statistical methods. http://www.itl.nist.gov/div898/handbook/eda/section3/boxplot.htm, 2003.
    • (2003) Handbook of Statistical Methods
  • 24
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues and open problems
    • H. Federrath, editor, Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag
    • J. Raymond. Traffic analysis: Protocols, attacks, design issues and open problems. In H. Federrath, editor, Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10-29. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.1
  • 25
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication theory of secrecy systems. Bell Sys. Tech. J., 28:656-715, 1949.
    • (1949) Bell Sys. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 30
    • 84944785767 scopus 로고    scopus 로고
    • March
    • Agilent Technologies. Agilent j6841a network analyzer software. http://onenetworks.comms.agilent.com/NetworkAnalyzer/J6841A.asp, March 2002.
    • (2002) Agilent J6841a Network Analyzer Software
  • 31
    • 24344490149 scopus 로고    scopus 로고
    • TimeSys. Timesys linux docs. http://www.timesys.com/index.cfm?hdr=home-header.cfm&bdy=home-bdy-library.cfm, 2003.
    • (2003) Timesys Linux Docs
  • 33
    • 0028713303 scopus 로고
    • Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
    • B. R. Venkatraman and R. E. Newman-Wolfe. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. Computer Security Applications Conference, 10th Annual, pages 288-297, 1994.
    • (1994) Computer Security Applications Conference, 10th Annual , pp. 288-297
    • Venkatraman, B.R.1    Newman-Wolfe, R.E.2
  • 34
    • 0020762394 scopus 로고
    • Security mechanisms in highlevel network protocols
    • V. Voydoc and S. Kent. Security mechanisms in highlevel network protocols. ACM Computing Surveys, pages 135-171, 1983.
    • (1983) ACM Computing Surveys , pp. 135-171
    • Voydoc, V.1    Kent, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.