메뉴 건너뛰기




Volumn , Issue , 2011, Pages

SWIRL: A Scalable Watermark to Detect Correlated Network Flows

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; TRAFFIC CONGESTION; WATERMARKING;

EID: 85180621070     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (90)

References (25)
  • 1
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • I. S. Moskowitz, editor, pages Springer, Apr
    • A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Information Hiding, volume 2137 of Lecture Notes in Computer Science, pages 245–247. Springer, Apr. 2001.
    • (2001) Information Hiding, volume 2137 of Lecture Notes in Computer Science , pp. 245-247
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 5
  • 7
    • 85076290610 scopus 로고    scopus 로고
    • A practical congestion attack on Tor using long paths
    • F. Monrose, editor, pages USENIX, Aug
    • N. Evans, R. Dingledine, and C. Grothoff. A practical congestion attack on Tor using long paths. In F. Monrose, editor, USENIX Security Symposium, pages 33–50. USENIX, Aug. 2009.
    • (2009) USENIX Security Symposium , pp. 33-50
    • Evans, N.1    Dingledine, R.2    Grothoff, C.3
  • 8
    • 77952331178 scopus 로고    scopus 로고
    • Detecting covert timing channels: an entropy-based approach
    • P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, pages ACM, Oct
    • S. Gianvecchio and H. Wang. Detecting covert timing channels: an entropy-based approach. In P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, ACM Conference on Computer and Communications Security, pages 307–316. ACM, Oct. 2007.
    • (2007) ACM Conference on Computer and Communications Security , pp. 307-316
    • Gianvecchio, S.1    Wang, H.2
  • 9
    • 85177693003 scopus 로고    scopus 로고
    • RAINBOW: A robust and invisible non-blind watermark for network flows
    • G. Vigna, editor, Internet Society, Feb
    • A. Houmansadr, N. Kiyavash, and N. Borisov. RAINBOW: A robust and invisible non-blind watermark for network flows. In G. Vigna, editor, Network and Distributed System Security Symposium. Internet Society, Feb. 2009.
    • (2009) Network and Distributed System Security Symposium
    • Houmansadr, A.1    Kiyavash, N.2    Borisov, N.3
  • 10
    • 80052167664 scopus 로고    scopus 로고
    • Multiflow attacks against network flow watermarking schemes
    • P. van Oorschot, editor, USENIX, July
    • N. Kiyavash, A. Houmansadr, and N. Borisov. Multiflow attacks against network flow watermarking schemes. In P. van Oorschot, editor, USENIX Security Symposium. USENIX, July 2008.
    • (2008) USENIX Security Symposium
    • Kiyavash, N.1    Houmansadr, A.2    Borisov, N.3
  • 11
    • 27544454707 scopus 로고    scopus 로고
    • Low-cost traffic analysis of tor
    • Paxson and M. Waidner, editors, IEEE Computer Society, May
    • S. Murdoch and G. Danezis. Low-cost traffic analysis of tor. In V. Paxson and M. Waidner, editors, IEEE Symposium on Security and Privacy. IEEE Computer Society, May 2005.
    • (2005) IEEE Symposium on Security and Privacy
    • Murdoch, S.1    Danezis, G.2
  • 13
    • 33751040560 scopus 로고    scopus 로고
    • On the secrecy of timing-based active watermarking trace-back techniques
    • Paxson and B. Pfitzmann, editors, pages IEEE Computer Society Press, May
    • P. Peng, P. Ning, and D. S. Reeves. On the secrecy of timing-based active watermarking trace-back techniques. In V. Paxson and B. Pfitzmann, editors, IEEE Symposium on Security and Privacy, pages 334–349. IEEE Computer Society Press, May 2006.
    • (2006) IEEE Symposium on Security and Privacy , pp. 334-349
    • Peng, P.1    Ning, P.2    Reeves, D. S.3
  • 15
    • 34548314612 scopus 로고    scopus 로고
    • Tracing traffic through intermediate hosts that repacketize flows
    • G. Kesidis, E. Modiano, and R. Srikant, editors, pages IEEE Communications Society, May
    • Y. Pyun, Y. Park, X. Wang, D. S. Reeves, and P. Ning. Tracing traffic through intermediate hosts that repacketize flows. In G. Kesidis, E. Modiano, and R. Srikant, editors, IEEE Conference on Computer Communications (INFOCOM), pages 634–642. IEEE Communications Society, May 2007.
    • (2007) IEEE Conference on Computer Communications (INFOCOM) , pp. 634-642
    • Pyun, Y.1    Park, Y.2    Wang, X.3    Reeves, D. S.4    Ning, P.5
  • 17
    • 0029232080 scopus 로고
    • Holding intruders accountable on the Internet
    • C. Meadows and J. McHugh, editors, pages IEEE Computer Society Press, May
    • S. Staniford-Chen and L. T. Heberlein. Holding intruders accountable on the Internet. In C. Meadows and J. McHugh, editors, IEEE Symposium on Security and Privacy, pages 39–49. IEEE Computer Society Press, May 1995.
    • (1995) IEEE Symposium on Security and Privacy , pp. 39-49
    • Staniford-Chen, S.1    Heberlein, L. T.2
  • 19
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • X. Wang, S. Chen, and S. Jajodia. Network flow watermarking attack on low-latency anonymous communication systems. In Pfitzmann and McDaniel [14], pages 116–130.
    • Pfitzmann and McDaniel [14] , pp. 116-130
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 20
    • 84957003012 scopus 로고    scopus 로고
    • Inter-packet delay based correlation for tracing encrypted connections through stepping stones
    • D. Gollmann, G. Karjoth, and M. Waidner, editors, pages Springer, Oct
    • X. Wang, D. Reeves, and S. F. Wu. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In D. Gollmann, G. Karjoth, and M. Waidner, editors, European Symposium on Research in Computer Security, volume 2502 of Lecture Notes in Computer Science, pages 244–263. Springer, Oct. 2002.
    • (2002) European Symposium on Research in Computer Security, volume 2502 of Lecture Notes in Computer Science , pp. 244-263
    • Wang, X.1    Reeves, D.2    Wu, S. F.3
  • 21
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • Atluri, editor, pages ACM
    • X. Wang and D. S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In V. Atluri, editor, ACM Conference on Computer and Communications Security, pages 20–29. ACM, 2003.
    • (2003) ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D. S.2
  • 24
    • 34548755641 scopus 로고    scopus 로고
    • DSSSbased flow marking technique for invisible traceback
    • W. Yu, X. Fu, S. Graham, D.Xuan, and W. Zhao. DSSSbased flow marking technique for invisible traceback. In Pfitzmann and McDaniel [14], pages 18–32.
    • Pfitzmann and McDaniel , vol.14 , pp. 18-32
    • Yu, W.1    Fu, X.2    Graham, S.3    Xuan, D.4    Zhao, W.5
  • 25
    • 85084161090 scopus 로고    scopus 로고
    • Detecting stepping stones
    • S. Bellovin and G. Rose, editors, pages USENIX, Aug
    • Y. Zhang and V. Paxson. Detecting stepping stones. In S. Bellovin and G. Rose, editors, USENIX Security Symposium, pages 171–184. USENIX, Aug. 2000.
    • (2000) USENIX Security Symposium , pp. 171-184
    • Zhang, Y.1    Paxson, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.