A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have
been designed to provide anonymity service for users. In order to hide the communication of …
been designed to provide anonymity service for users. In order to hide the communication of …
Online sketching of network flows for real-time stepping-stone detection
We present an efficient and robust stepping-stone detection scheme based on succinct
packet-timing sketches of network flows. The proposed scheme employs an online algorithm …
packet-timing sketches of network flows. The proposed scheme employs an online algorithm …
An interval centroid based spread spectrum watermark for tracing multiple network flows
X Wang, J Luo, M Yang - 2009 IEEE International Conference …, 2009 - ieeexplore.ieee.org
Network flow watermarking schemes have been proposed to trace attackers in the presence
of stepping stones or anonymized channels. Most existing interval-based watermarking …
of stepping stones or anonymized channels. Most existing interval-based watermarking …
[PDF][PDF] On the channel capacity of network flow watermarking
On the channel capacity of network flow watermarking Page 1 On the channel capacity of
network flow watermarking Amir Houmansadr∗ Todd Coleman∗ Negar Kiyavash† Nikita …
network flow watermarking Amir Houmansadr∗ Todd Coleman∗ Negar Kiyavash† Nikita …