A new cell counter based attack against tor

Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia - Proceedings of the 16th ACM …, 2009 - dl.acm.org
Various low-latency anonymous communication systems such as Tor and Anoymizer have
been designed to provide anonymity service for users. In order to hide the communication of …

Online sketching of network flows for real-time stepping-stone detection

B Coskun, N Memon - 2009 Annual Computer Security …, 2009 - ieeexplore.ieee.org
We present an efficient and robust stepping-stone detection scheme based on succinct
packet-timing sketches of network flows. The proposed scheme employs an online algorithm …

An interval centroid based spread spectrum watermark for tracing multiple network flows

X Wang, J Luo, M Yang - 2009 IEEE International Conference …, 2009 - ieeexplore.ieee.org
Network flow watermarking schemes have been proposed to trace attackers in the presence
of stepping stones or anonymized channels. Most existing interval-based watermarking …

[PDF][PDF] On the channel capacity of network flow watermarking

A Houmansadr, T Coleman, N Kiyavash… - Proceedings of 16th …, 2009 - sigsac.org
On the channel capacity of network flow watermarking Page 1 On the channel capacity of
network flow watermarking Amir Houmansadr∗ Todd Coleman∗ Negar Kiyavash† Nikita …

[引用][C] DMark: A Data-dependent Network Flow Watermark