[1] |
WANG X , REEVES D . Robust correlation of encrypted attack traffic through stepping stones by flow watermarking[J]. IEEE Transactions on Dependable and Secure Computing, 2011,8(3): 434-449.
|
[2] |
SNOEREN A , PATRIDGE C ,et al. Hash-based IP traceback[C]// Proceedings of ACM SIGCOMM, 2001: 3-14.
|
[3] |
GOODRICH M T , . Efficient packet marking for large-scale iptraceback[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002). 2002: 117-126.
|
[4] |
吕博, 廖勇, 谢海永 . Tor 匿名网络攻击技术综述[J]. 中国电子科学研究院学报, 2017(1): 14-15.
|
|
LV B , LIAO Y , XIE H Y . Survey on attack technologies to Tor anonymous network[J]. Journal of CAEIT, 2017(1): 14-15
|
[5] |
何永忠, 李响, 陈美玲 ,等. 基于云流量混淆的 Tor 匿名通信识别方法[J]. 工程科学与技术, 2017(2): 121-122.
|
|
HE Y Z , LI X , CHEN M L ,et al. Identification of Tor anonymous communication with cloud traffic obfuscation[J]. Advanced Engineering Sciences, 2017(2): 121-122.
|
[6] |
WANG X , CHEN S , JAJODIA S . Tracking anonymous peer-to-peer VoIP calls on the Internet[C]// ACM Conference on Computer and Communications Security. 2005: 81-91.
|
[7] |
HOUMANSADR A , KIYAVASH N , BORISOV N . RAINBOW:a robust and invisible non-blind watermark for network flows[C]// Network and Distributed System Security Symposium,San Diego, 2009.
|
[8] |
WANG X , CHEN S , JAJODIA S . Network flow watermarking attack on low-latency anonymous communication systems[C]// IEEE Symposium on Security and Privacy. IEEE Computer Society, 2007: 116-130.
|
[9] |
PYUN Y J , PARK Y H , WANG X ,et al. Tracing traffic through intermediate hosts that repacketize flows[C]// IEEE International Conference on Computer Communications. 2007: 634-642.
|
[10] |
PANCHENKO A , LANZE F , ZINNEN A ,et al. Website fingerprinting at internet scale[C]// Network and Distributed System Security Symposium. 2016.
|
[11] |
郭晓军, 程光, 朱琛刚 ,等. 主动网络流水印技术研究进展[J]. 通信学报, 2014,35(7): 178-192.
|
|
GUO X J , CHENG G , ZHU C G ,et al. Progress in research on active network flow watermark[J]. Journal on Communications, 2014,35(7): 178-192.
|
[12] |
LEI C , ZHANG H , LIU Y ,et al. Net-flow fingerprint model based on optimization theory[J]. Arabian Journal for Science & Engineering, 2016,41(8): 3081-3088.
|
[13] |
KIYAVASH N , HOUMANSADR A , BORISOV N . Multi-flow attacks against network flow watermarking schemes[C]// Conference on Security Symposium. USENIX Association, 2008: 307-320.
|