메뉴 건너뛰기




Volumn , Issue , 2009, Pages

RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL WATERMARKING; INFORMATION THEORY; INTRUSION DETECTION; NETWORK SECURITY; WATERMARKING;

EID: 85177693003     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (122)

References (24)
  • 4
    • 0035251780 scopus 로고    scopus 로고
    • Quantization index modulation methods for digital watermarking and information embedding of multimedia
    • B. Chen and G. W. Wornell. Quantization index modulation methods for digital watermarking and information embedding of multimedia. The Journal of VLSI Signal Processing, 27(1–2):7–33, 2001.
    • (2001) The Journal of VLSI Signal Processing , vol.27 , Issue.1–2 , pp. 7-33
    • Chen, B.1    Wornell, G. W.2
  • 7
    • 85084161366 scopus 로고    scopus 로고
    • Tor: The second-generation onion router
    • M. Blaze, editor, Berkeley, CA, USA, USENIX Association
    • R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In M. Blaze, editor, USENIX Security Symposium, Berkeley, CA, USA, 2004. USENIX Association.
    • (2004) USENIX Security Symposium
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.3
  • 9
    • 77952331178 scopus 로고    scopus 로고
    • Detecting covert timing channels: an entropy-based approach
    • P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, pages ACM
    • S. Gianvecchio and H. Wang. Detecting covert timing channels: an entropy-based approach. In P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, ACM Conference on Computer and Communications Security, pages 307–316. ACM, 2007.
    • (2007) ACM Conference on Computer and Communications Security , pp. 307-316
    • Gianvecchio, S.1    Wang, H.2
  • 10
    • 34247844336 scopus 로고    scopus 로고
    • Detecting encrypted stepping-stone connections
    • May
    • T. He and L. Tong. Detecting encrypted stepping-stone connections. IEEE Transactions on Signal Processing, 55(5):1612–1623, May 2007.
    • (2007) IEEE Transactions on Signal Processing , vol.55 , Issue.5 , pp. 1612-1623
    • He, T.1    Tong, L.2
  • 11
    • 80052167664 scopus 로고    scopus 로고
    • Multiflow attacks against network flow watermarking schemes
    • P. van Oorschot, editor, Berkeley, CA, USA, USENIX Association
    • N. Kiyavash, A. Houmansadr, and N. Borisov. Multiflow attacks against network flow watermarking schemes. In P. van Oorschot, editor, USENIX Security Symposium, Berkeley, CA, USA, 2008. USENIX Association.
    • (2008) USENIX Security Symposium
    • Kiyavash, N.1    Houmansadr, A.2    Borisov, N.3
  • 13
    • 33751040560 scopus 로고    scopus 로고
    • On the secrecy of timing-based active watermarking trace-back techniques
    • Paxson and B. Pfitzmann, editors, pages IEEE Computer Society Press, May
    • P. Peng, P. Ning, and D. S. Reeves. On the secrecy of timing-based active watermarking trace-back techniques. In V. Paxson and B. Pfitzmann, editors, IEEE Symposium on Security and Privacy, pages 334–349. IEEE Computer Society Press, May 2006.
    • (2006) IEEE Symposium on Security and Privacy , pp. 334-349
    • Peng, P.1    Ning, P.2    Reeves, D. S.3
  • 16
    • 34548314612 scopus 로고    scopus 로고
    • Tracing traffic through intermediate hosts that repacketize flows
    • G. Kesidis, E. Modiano, and R. Srikant, editors, pages May
    • Y. Pyun, Y. Park, X. Wang, D. S. Reeves, and P. Ning. Tracing traffic through intermediate hosts that repacketize flows. In G. Kesidis, E. Modiano, and R. Srikant, editors, IEEE Conference on Computer Communications (INFOCOM), pages 634–642, May 2007.
    • (2007) IEEE Conference on Computer Communications (INFOCOM) , pp. 634-642
    • Pyun, Y.1    Park, Y.2    Wang, X.3    Reeves, D. S.4    Ning, P.5
  • 17
    • 0029232080 scopus 로고
    • Holding intruders accountable on the Internet
    • C. Meadows and J. McHugh, editors, pages IEEE Computer Society Press, May
    • S. Staniford-Chen and L. T. Heberlein. Holding intruders accountable on the Internet. In C. Meadows and J. McHugh, editors, IEEE Symposium on Security and Privacy, pages 39–49. IEEE Computer Society Press, May 1995.
    • (1995) IEEE Symposium on Security and Privacy , pp. 39-49
    • Staniford-Chen, S.1    Heberlein, L. T.2
  • 18
    • 33745773302 scopus 로고    scopus 로고
    • Tracking anonymous peer-to-peer VoIP calls on the Internet
    • C. Meadows, editor, pages New York, NY, USA, Nov. ACM
    • X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer VoIP calls on the Internet. In C. Meadows, editor, ACM Conference on Computer and Communications Security, pages 81–91, New York, NY, USA, Nov. 2005. ACM.
    • (2005) ACM Conference on Computer and Communications Security , pp. 81-91
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 19
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • X. Wang, S. Chen, and S. Jajodia. Network flow watermarking attack on low-latency anonymous communication systems. In Pfitzmann and McDaniel [14], pages 116–130.
    • Pfitzmann and McDaniel [14] , pp. 116-130
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 20
    • 84957003012 scopus 로고    scopus 로고
    • Inter-packet delay based correlation for tracing encrypted connections through stepping stones
    • D. Gollmann, G. Karjoth, and M. Waidner, editors, pages Springer, Oct
    • X. Wang, D. Reeves, and S. F. Wu. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In D. Gollmann, G. Karjoth, and M. Waidner, editors, European Symposium on Research in Computer Security, volume 2502 of Lecture Notes in Computer Science, pages 244–263. Springer, Oct. 2002.
    • (2002) European Symposium on Research in Computer Security, volume 2502 of Lecture Notes in Computer Science , pp. 244-263
    • Wang, X.1    Reeves, D.2    Wu, S. F.3
  • 21
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • Atluri, editor, pages New York, NY, USA, ACM
    • X. Wang and D. S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In V. Atluri, editor, ACM Conference on Computer and Communications Security, pages 20–29, New York, NY, USA, 2003. ACM.
    • (2003) ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D. S.2
  • 22
    • 33749461359 scopus 로고    scopus 로고
    • The secure shell (SSH) protocol architecture
    • Jan
    • T. Ylonen and C. Lonvick. The secure shell (SSH) protocol architecture. RFC 4251, Jan. 2006.
    • (2006) RFC 4251
    • Ylonen, T.1    Lonvick, C.2
  • 23
    • 34548755641 scopus 로고    scopus 로고
    • DSSSbased flow marking technique for invisible traceback
    • W. Yu, X. Fu, S. Graham, D.Xuan, and W. Zhao. DSSSbased flow marking technique for invisible traceback. In Pfitzmann and McDaniel [14], pages 18–32.
    • Pfitzmann and McDaniel , vol.14 , pp. 18-32
    • Yu, W.1    Fu, X.2    Graham, S.3    Xuan, D.4    Zhao, W.5
  • 24
    • 85084161090 scopus 로고    scopus 로고
    • Detecting stepping stones
    • S. Bellovin and G. Rose, editors, pages Berkeley, CA, USA, Aug. USENIX Association
    • Y. Zhang and V. Paxson. Detecting stepping stones. In S. Bellovin and G. Rose, editors, USENIX Security Symposium, pages 171–184, Berkeley, CA, USA, Aug. 2000. USENIX Association.
    • (2000) USENIX Security Symposium , pp. 171-184
    • Zhang, Y.1    Paxson, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.