메뉴 건너뛰기




Volumn , Issue , 2014, Pages

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; NETWORK SECURITY;

EID: 85180623308     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23288     Document Type: Conference Paper
Times cited : (84)

References (45)
  • 1
    • 85180620047 scopus 로고    scopus 로고
    • “OOM Killer,” http://linux-mm.org/OOM_Killer.
    • OOM Killer
  • 2
    • 85180628625 scopus 로고    scopus 로고
    • “R-U-Dead-Yet (RUDY),” https://code.google.com/p/r-u-dead-yet/.
    • R-U-Dead-Yet (RUDY)
  • 3
  • 4
    • 84903982848 scopus 로고    scopus 로고
    • Acc. June 2013
    • “TC: A Tor control protocol (Version 1),” https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=control-spec.txt, Acc. June 2013.
    • TC: A Tor control protocol (Version 1)
  • 6
    • 84870651248 scopus 로고    scopus 로고
    • “The Tor Project,” https://www.torproject.org/.
    • The Tor Project
  • 7
    • 84949970109 scopus 로고    scopus 로고
    • Acc. July 2013
    • “Tor directory protocol, version 3,” https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=dir-spec.txt, Acc. July 2013.
    • Tor directory protocol, version 3
  • 9
    • 84872359093 scopus 로고    scopus 로고
    • Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver
    • Oct
    • F. Adamsky, S. A. Khayam, R. Jager, and M. Rajarajan, “Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver,” in CyberC’12, Oct. 2012.
    • (2012) CyberC’12
    • Adamsky, F.1    Khayam, S. A.2    Jager, R.3    Rajarajan, M.4
  • 12
    • 84881248798 scopus 로고    scopus 로고
    • Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
    • May
    • A. Biryukov, I. Pustogarov, and R.-P. Weinmann, “Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization,” in SP’13, May 2013.
    • (2013) SP’13
    • Biryukov, A.1    Pustogarov, I.2    Weinmann, R.-P.3
  • 15
    • 84872008887 scopus 로고    scopus 로고
    • Effectiveness and Detection of Denial-of-Service Attacks in Tor
    • Nov
    • N. Danner, S. Defabbia-Kane, D. Krizanc, and M. Liberatore, “Effectiveness and Detection of Denial-of-Service Attacks in Tor,” ACM TISSEC, vol. 15, no. 3, Nov. 2012.
    • (2012) ACM TISSEC , vol.15 , Issue.3
    • Danner, N.1    Defabbia-Kane, S.2    Krizanc, D.3    Liberatore, M.4
  • 16
    • 85180621908 scopus 로고    scopus 로고
    • Securing Anonymous Communication Channels under the Selective DoS Attack
    • A. Das and N. Borisov, “Securing Anonymous Communication Channels under the Selective DoS Attack,” in FC’13.
    • FC’13
    • Das, A.1    Borisov, N.2
  • 20
    • 61849089615 scopus 로고    scopus 로고
    • TCP SYN Flooding Attacks and Common Mitigations
    • IETF, Aug
    • W. Eddy, “TCP SYN Flooding Attacks and Common Mitigations,” RFC 4987, IETF, Aug. 2007.
    • (2007) RFC 4987
    • Eddy, W.1
  • 21
    • 85056899231 scopus 로고    scopus 로고
    • Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor
    • Oct
    • T. Elahi, K. Bauer, M. AlSabah, R. Dingledine, and I. Goldberg, “Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor,” in WPES’12, Oct. 2012.
    • (2012) WPES’12
    • Elahi, T.1    Bauer, K.2    AlSabah, M.3    Dingledine, R.4    Goldberg, I.5
  • 24
    • 84922420033 scopus 로고    scopus 로고
    • How Low Can You Go: Balancing Performance with Anonymity in Tor
    • Jul
    • J. Geddes, R. Jansen, and N. Hopper, “How Low Can You Go: Balancing Performance with Anonymity in Tor,” in PETS’13, Jul. 2013.
    • (2013) PETS’13
    • Geddes, J.1    Jansen, R.2    Hopper, N.3
  • 26
    • 85180621554 scopus 로고    scopus 로고
    • Exploiting TCP and the Persist Timer Infiniteness
    • ithilgore, 0x0d 0x42, Jun
    • ithilgore, “Exploiting TCP and the Persist Timer Infiniteness,” Phrack Magazine, vol. 0x0d, no. 0x42, Jun. 2009.
    • (2009) Phrack Magazine
  • 28
    • 85180760932 scopus 로고    scopus 로고
    • Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
    • Feb
    • R. Jansen and N. Hopper, “Shadow: Running Tor in a Box for Accurate and Efficient Experimentation,” in NDSS’12, Feb. 2012.
    • (2012) NDSS’12
    • Jansen, R.1    Hopper, N.2
  • 30
    • 33744524845 scopus 로고    scopus 로고
    • Low-rate TCP-targeted Denial of Service Attacks and Counter Strategies
    • A. Kuzmanovic and E. W. Knightly, “Low-rate TCP-targeted Denial of Service Attacks and Counter Strategies,” IEEE/ACM TON, vol. 14, no. 4, 2006.
    • (2006) IEEE/ACM TON , vol.14 , Issue.4
    • Kuzmanovic, A.1    Knightly, E. W.2
  • 33
    • 80755187817 scopus 로고    scopus 로고
    • Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
    • Oct
    • P. Mittal, A. Khurshid, J. Juen, M. Caesar, and N. Borisov, “Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting,” in CCS’11, Oct. 2011.
    • (2011) CCS’11
    • Mittal, P.1    Khurshid, A.2    Juen, J.3    Caesar, M.4    Borisov, N.5
  • 34
  • 35
    • 84866638923 scopus 로고    scopus 로고
    • Valet Services: Improving Hidden Servers with a Personal Touch
    • Jun
    • L. Øverlier and P. Syverson, “Valet Services: Improving Hidden Servers with a Personal Touch,” in PETS’06, Jun. 2006.
    • (2006) PETS’06
    • Øverlier, L.1    Syverson, P.2
  • 37
    • 0003973018 scopus 로고    scopus 로고
    • Computing TCP’s Retransmission Timer
    • IETF, Jun
    • V. Paxson, M. Allman, J. Chu, and M. Sargent, “Computing TCP’s Retransmission Timer,” RFC 6298, IETF, Jun. 2011.
    • (2011) RFC 6298
    • Paxson, V.1    Allman, M.2    Chu, J.3    Sargent, M.4
  • 38
    • 84905280236 scopus 로고    scopus 로고
    • RSnake
    • RSnake, “Slowloris HTTP DoS,” http://ha.ckers.org/slowloris/.
    • Slowloris HTTP DoS
  • 41
    • 33745803440 scopus 로고    scopus 로고
    • Misbehaving TCP Receivers Can Cause Internet-wide Congestion Collapse
    • Nov
    • R. Sherwood, B. Bhattacharjee, and R. Braud, “Misbehaving TCP Receivers Can Cause Internet-wide Congestion Collapse,” in CCS’05, Nov. 2005.
    • (2005) CCS’05
    • Sherwood, R.1    Bhattacharjee, B.2    Braud, R.3
  • 43
    • 84856133258 scopus 로고    scopus 로고
    • Tor is unfair – and what to do about it
    • Oct
    • F. Tschorsch and B. Scheuermann, “Tor is unfair – and what to do about it,” in LCN’11, Oct. 2011.
    • (2011) LCN’11
    • Tschorsch, F.1    Scheuermann, B.2
  • 44
    • 85084161332 scopus 로고    scopus 로고
    • How the Great Firewall of China is blocking Tor
    • Aug
    • P. Winter and S. Lindskog, “How the Great Firewall of China is blocking Tor,” in FOCI’12, Aug. 2012.
    • (2012) FOCI’12
    • Winter, P.1    Lindskog, S.2
  • 45
    • 0023829320 scopus 로고
    • A Formal Specification and Verification Method for the Prevention of Denial of Service
    • May
    • C.-F. Yu and V. D. Gligor, “A Formal Specification and Verification Method for the Prevention of Denial of Service,” in SP’88, May 1988.
    • (1988) SP’88
    • Yu, C.-F.1    Gligor, V. D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.