[1] |
ERIC W , SCOTT W , IAN G , et al. Telex: anticensorship in the net-work infrastructure[A]. Proceedings of the 20th USENIX Security Symposium[C]. San Francisco,USA, 2011.
|
[2] |
AMIR H , GIANG T K N , CAESAR M , NIKITA B . Cirripede: cir-cumvention infrastructure using router redirection with plausible de-niability[A]. Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)[C]. Chicago,IL,USA, 2011.187-200.
|
[3] |
JOSH K , DANIEL E , ALDEN W , et al. Decoy routing: toward un-blockable Internet communication[A]. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)[C]. 2011.
|
[4] |
RICHARD C , STEVEN J M , ROBERT N M W , et al. Ignoring the great firewall of China[A]. Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)[C]. Cambridge,UK, 2006.20-35.
|
[5] |
TARIQ E , IAN G . CORDON — A Taxonomy of Internet Censorship Resistance Strategies[R]. CACR Tech Report 2012-33, 2012.
|
[6] |
PHILIPP W , STEFAN L . How the great firewall of China is blocking[A]. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)[C]. 2012.
|
[7] |
QIYAN W , XUN G , GIANG T K , et al. CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing[A]. Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)[C]. 2012.
|
[8] |
MAX S , JOHN G , CHRISTOPHER T , et al. Routing around decoys[A]. Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012)[C]. Raleigh,USA, 2012.85-96.
|
[9] |
HOUMANSADR A , EDMUND L W , VITALY S . No direction home:the true cost of routing around decoys[A]. Proceedings of the Network and Distributed Security Symposium (NDSS 2014)[C]. 2014.
|
[10] |
ANDREW H . Fingerprinting websites using traffic analysis[A]. Pro-ceedings of Privacy Enhancing Technologies workshop (PET 2002)[C]. 2002.
|
[11] |
Cooperative association for Internet data analysis (CAIDA)[EB/OL]. .
|
[12] |
Telex[EB/OL]. .
|
[13] |
Netfilter/Iptables[EB/OL]. .
|
[14] |
Squid[EB/OL]. .
|
[15] |
TOBY E , LI J . On the state of IP spoofing defense[J]. ACM Transac-tions on Internet Technology, 2009,9(2):1-29.
|
[16] |
The MIT ANA Spoofer project[EB/OL]. .
|
[17] |
Internet Traffic Report[EB/OL]. .
|
[18] |
Netem/TC[EB/OL]. .
|
[19] |
HomeIP[EB/OL]. .
|
[20] |
WITS[EB/OL]. .
|