[1] Zhang Yin, Paxson V. Detecting stepping stones[C]//Proceedings of the 9th USENIX Security Symposium,Denver, Colorado, 2000: 171-184.
[2] Donoho D L, Flesia A G, Shankar U, Paxson V, Coit J, Stanford S. Multiscale steppingstone detection: detecting pairs of jittered interactive
streams by exploiting maximum tolerable delay[C]//Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection,
Zurich, Switzerland, 2002: 17-35.
[3] Blum A, Song D, Venkataraman S. Detection of interactive stepping stones: algorithms and confidence bounds [C]//Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection, Sophia Antipolis, France, 2004: 258-277.
[4] Wang Xinyuan, Reeves D S, Wu S F. Inter-packet delay based correlation for tracing encrypted connections through stepping stones [C]//Proceedings of the 7th European Symposium on Research in Computer Security, Zurich, Switzerland, 2002: 244-263.
[5] Peng Pai, Ning Peng, Reeves D S, Wang Xinyuan. Active timing-based correlation of perturbed traffic flows with chaff packets
[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops, Columbus, OH, USA, 2005: 107-113.
[6] He Ting, Tong Lang. Detecting encrypted steppingstone connections [J]. IEEE Transactions on Signal Processing, 2007, 55(4): 1612-1623.
[7] Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms [J]. Communication of the ACM, 1981, 24(1): 84-88.
[8] Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router [C]//Proceedings of the 13th USENIX Security Symposium, San
Diego, CA, USA, 2004: 303-320.
[9] Reiter M K, Rubin A D. Anonymous web transactions with crowds [J]. Communications of the ACM, 1999, 42(2): 32-38.
[10] Freedman M J, Morris R. Tarzan: a peer-to-peer anonymizing network layer [C]//Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2002: 303- 320.
[11] Yoda K, Etoh H. Finding a connection chain for tracing intruders [C]//Proceedings of the 6th European Symposium on Research in Computer Security, Toulouse, France, 2000: 191-205.
[12] Wang Xinyuan, Reeves D S. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays [C]//Proceedingsof the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003:20-29.
[13] Pyun Y J, Park Y H, Wang Xinyuan, Reeves D S, Ning Peng. Tracing traffic through intermediate hosts that repacketize flows [C]//Proceedings
of the 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007:634-642.
[14] Wang Xinyuan, Chen Shiping, Jajodia S. Network flow watermarking attack on low-latency anonymous communication systems [C]//Proceedings of 2007 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2007: 116-130.
[15] Yu Wei, Fu Xinwen, Graham S, Xuan Dong, Zhao Wei. DSSS-based flow marking technique for invisible traceback [C]//Proceedings of 2007 IEEE
Symposium on Security and Privacy, Oakland, CA, USA, 2007: 7-21.
[16] Kiyavash N, Houmansadr A, Borisov N. Multiflow attacks against network flow watermarking schemes [C]//Proceedings of 17th USENIX Security,
San Jose, CA, USA, 2008: 307-320.
[17] Jia Weijia, Tso F P, Ling Zhen, Fu Xinwen, Xuan Dong, Yu Wei. Blind detection of spread spectrum flow watermarks [C]//Proceedings of the
28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, 2009: 2195-2203.
[18] Peng Pai, Ning Peng, Reeves D S. On the secrecy of timing-based active watermarking trace-back techniques [C]//Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2006: 334-349.
[19] Houmansadr A, Kiyavash N, Borisov N. RAINBOW: a robust and invisible non-blind watermark for network flows [C]//Proceedings of the 16th Annual Network & Distributed System Security Symposium,San Diego, CA, USA, 2009: 224-236. |