[12] |
LUO X , ZHANG J , PERDISCI R ,et al. On the secrecy of spread-spectrum flow watermarks[C]// European Symposium on Research in Computer Security. 2010: 232-248.
|
[13] |
DENGLE S , LOMTE S . Active watermarking approach in detecting encrypted traffic attack by making correlation scheme robust[J]. International Journal of Science and Research, 2014,8(3): 691-695.
|
[14] |
QURESHI A , MEGíAS D , RIFà-POUS H . Framework for preserving security and privacy in peer-to-peer content distribution systems[J]. Expert Systems with Applications, 2015,42(3): 1391-1408.
|
[15] |
GIANVECCHIO S , WANG H . DSSS-based flow marking technique for invisible traceback channels:an entropy-based approach[C]// ACM Conference on Computer and Communications Security. 2007: 307-316.
|
[1] |
何高峰, 杨明, 罗军舟 ,等. 洋葱路由追踪技术中时间特征的建模与分析[J]. 计算机学报, 2014,2(37): 357-371.
|
|
HE G F , YANG M , LUO J Z ,et al. Modeling and analysis of time characteristics used in onion routing traceback techniques[J]. Chinese Journal of Computers, 2014,2(37): 357-371.
|
[2] |
郭晓军, 程光, 朱琛刚 ,等. 主动网络流水印技术研究进展[J]. 通信学报, 2014,35(7): 178-192.
|
|
GUO X J , CHENG G , ZHU C G ,et al. Progress in research on active network flow watermark[J]. Journal on Communications, 2014,35(7): 178-192.
|
[3] |
WANG X , REEVES D S . Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays[C]// ACM Conference on Computer and Communications Security. 2003: 20-29.
|
[4] |
PAN Z , PENG H , LONG X ,et al. A watermarking-based host correlation detection scheme[C]// International Conference on Management of e-Commerce and e-Government. 2009: 493-497.
|
[5] |
PYUN Y J , PARK Y H , WANG X ,et al. Tracing traffic through intermediate hosts that repacketize flows[C]// IEEE International Conference on Computer Communications. 2007: 634-642.
|
[6] |
WANG X , CHEN S , JAJODIA S . Network flow watermarking attack on low-latency anonymous communication systems[C]// IEEE Symposium on Security and Privacy. 2007: 116-130.
|
[7] |
KIYAVASH N , HOUMANSADR A , BORISOV N . Multi-flow attacks against network flow watermarking schemes[C]// USENIX Security Symposium. 2008: 307-320.
|
[8] |
张连成, 王振兴, 孙建平 . 基于时间间隔的扩频流水印技术[J]. 计算机应用研究, 2011,28(8): 3049-3053.
|
|
ZHANG L C , WANG Z X , SUN J P . Interval-based spectrum watermarking scheme for tracing network flows[J]. Application Research of Computers, 2011,28(8): 3049-3053.
|
[9] |
张璐, 罗军舟, 杨明 ,等. 基于时隙质心流水印的匿名通信追踪技术[J]. 软件学报, 2011,22(10): 2358-2371.
|
|
ZHANG L , LUO J Z , YANG M ,et al. Interval centroid based flow watermarking technique for anonymous communication traceback[J]. Journal of Software, 2011,22(10): 2358-2371.
|
[10] |
LUO J , WANG X , YANG M . An interval centroid based spread spectrum watermarking scheme for multi-flow traceback[J]. Journal of Network and Computer Applications, 2012,35(1): 60-71.
|
[11] |
RAMYA K P , REVATHI M K . Protecting streaming data using provenance spread spectrum watermarking[J]. Research in Computer and Communication Engineering, 2014,3(2): 2109-2114.
|
[16] |
HOUMANSADR A , KIYAVASH N , BORISOV N . Rainbow:a robust and invisible non-blind watermark for network flows[C]// 16th Annual Network& Distributed System Security Symposium(NDSS'09). 2009: 224-236.
|