期刊文献+

网站指纹攻击与防御技术研究综述 被引量:2

原文传递
导出
摘要 网站指纹攻击是对军事信息网络中加密流量实施监管与审查的基础技术。在对网站指纹攻击技术进行概述的基础上,介绍了基于流量特征的三种网站指纹攻击方法及其特点和不足,分析了当前基于深度学习的网站指纹攻击方法的优势和面临的挑战。阐述了针对网站指纹攻击的防御方法,并展望了下一步的研究方向。
出处 《飞航导弹》 北大核心 2019年第3期74-78,共5页 AERODYNAMIC MISSILE JOURNAL
基金 国家自然科学基金项目(51377170 61271152) 国家青年科学基金项目(61602505)
  • 相关文献

参考文献3

二级参考文献33

  • 1Dingledine R, Mathewson N, Syverson P. Tor: The second- generation onion router//Proceedings oi the 13th USENIX Security Symposium. San Diego, USA, 2004:21-21.
  • 2Yu W, Fu XW, Graham X, et al. DSSS-based flow marking technique for invisible traceback//Proceedings of the IEEE Symposium on Security and Privacy (IEEE S P). Oakland, USA, 2007:18-32.
  • 3Ling Z, Luo JZ, Yu W, et al. A new cell-counting-based attack against tor. IEEE/ACM Transactions on Networking, 2012, 20(4): 1245-1261.
  • 4Hintz A. Fingerprinting websites using traffic analysis// Proceedings of the Privacy Enhancing Technologies Workshop. San Francisco, USA, 2002:171-178.
  • 5Sun Q, Simon D, Wang Y, et al. Statistical identification of encrypted Web browsing traffic//Proeeedings of the 2002 IEEE Symposium on Security and Privacy (IEEE S -P). Oakland, USA, 2002:19-30.
  • 6Bissias G, Liberatore M, Jensen D, Levine B. Privacy vulnerabilities in encrypted HTTP streams//Proceedings of the Privacy Enhancing Technologies Workshop. ,Cavtat, Croatia, 2005:1-11.
  • 7Liberatore M, Levine B. Inferring the source of encrypted HTTP connections//Proceedings of the 13th ACM Conference on Computer and Communications Security(CCS). Alexandria, USA, 2006:255-263.
  • 8Herrmann D, Wendolsky R, Federrath H. Website finger- printing: Attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier//Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW). Chicago, USA, 2009:31-42.
  • 9Lu L, Chang E, Chan M. Website fingerprinting and identi- fication using ordered feature sequences//Proceedings of the European Symposium on Research in Computer Security (ESORICS). Athens, Greece, 2010:199-214.
  • 10Ling Z, Luo JZ, Zhang Y, et al. A novel network delay based side-channel attack: Modeling and defense//Proceed- ings of the 31th IEEE International Conference on Computer Communications (INFOCOM). Orlando, USA, 2012: 2390- 2398.

共引文献25

同被引文献21

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部