Panchenko, Andriy ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Niessen, Lukas; RWTH Aachen University, Germany
Zinnen, Andreas ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Engel, Thomas ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Language :
English
Title :
Website Fingerprinting in Onion Routing Based Anonymization Networks
Publication date :
2011
Event name :
18th ACM Computer and Communications Security (ACM CCS) Workshop on Privacy in the Electronic Society (WPES)
Event place :
Chicago, United States - Illinois
Event date :
October 2011
Audience :
International
Main work title :
18th ACM Computer and Communications Security (ACM CCS) Workshop on Privacy in the Electronic Society (WPES)
Publisher :
ACM Press
ISBN/EAN :
978-1-4503-0948-6
Peer reviewed :
Peer reviewed
Commentary :
Proceedings of the 18th ACM Computer and Communications Security (ACM CCS) Workshop on Privacy in the Electronic Society (WPES)
Jap anonymity and privacy. http://anon.inf.tu-dresden.de.
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A System for Anonymous and Unobservable Internet Access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pages 115-129. Springer-Verlag, July 2000.
G. D. Bissias, M. Liberatore, D. Jensen, and B. N. Levine. Privacy Vulnerabilities in Encrypted HTTP Streams. In G. Danezis and D. Martin, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2005), volume 3856 of Lecture Notes in Computer Science, pages 1-11. Springer-Verlag, June 2005.
H. Cheng and R. Avnur. Traffic analysis of SSL encrypted Web browsing. Project paper, University of Berkeley. Available at http://www.cs.berkeley.edu/ ~daw/teaching/cs261-f98/projects/final-reports/ronathan-heyning.ps, Dec. 1998.
N. Cristianini and J. Shawe-Taylor. An Introduction to Support Vector Machines and other kernel-based learning methods. Cambridge University Press, Mar. 2000.
G. Danezis. The traffic analysis of continuous-time mixes. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of LNCS, pages 35-50, May 2004. (Pubitemid 41251995)
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium, pages 303-320. USENIX Association, Aug. 2004.
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext Transfer Protocol: HTTP/1.1. Internet Engineering Task Force: RFC 2616, June 1999.
T. G, Abbott, K. J. Lai, M. R. Lieberman, and E. C. Price. Browser-based attacks on Tor. In N. Borisov and P. Golle, editors, Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. Springer.
X. Gong, N. Kiyavash, and N. Borisov. Fingerprinting websites using remote traffic analysis. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 684-686, New York, NY, USA, 2010. ACM.
D. Herrmann, R. Wendolsky, and H. Federrath. Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier. In CCSW '09: Proceedings of the 2009 ACM CCS Workshop on Cloud Computing Security, pages 31-42, Chicago, Illinois, USA, Nov. 2009. ACM Press.
A. Hintz. Fingerprinting websites using traffic analysis. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), volume 2482 of Lecture Notes in Computer Science, pages 171-178. Springer-Verlag, Apr. 2002.
G. John and P. Langley. Estimating continuous distributions in bayesian classifiers. In Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence, pages 338-345. Morgan Kaufmann, Aug. 1995.
M. Liberatore and B. N. Levine. Inferring the Source of Encrypted HTTP Connections. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pages 255-263, Alexandria, Virginia, USA, Oct. 2006. ACM Press. (Pubitemid 47131374)
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. Shining Light in Dark Places: Understanding the Tor Network. In N. Borisov and I. Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), pages 63-76, Leuven, Belgium, July 2008. Springer-Verlag.
S. Mistry and B. Raman. Quantifying Traffic Analysis of Encrypted Web-Browsing. Project paper, University of Berkeley. Available at http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.10.5823&rep= rep1&type=pdf, Dec. 1998.
S. J. Murdoch and G. Danezis. Low-Cost Traffic Analysis of Tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 183-195. IEEE Computer Society Press, May 2005. (Pubitemid 41543655)
S. J. Murdoch and P. Zielinski. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In N. Borisov and P. Golle, editors, Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), volume 4776 of Lecture Notes in Computer Science, pages 167-183. Springer-Verlag, June 2007.
L. Øverlier and P. Syverson. Locating hidden servers. In Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS, May 2006.
Q. Sun, D. R. Simon, Y.-M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical Identification of Encrypted Web Browsing Traffic. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (IEEE S&P), pages 19-30. IEEE Computer Society Press, May 2002. (Pubitemid 34648101)
C. J. van Rijsbergen. Information Retrieval. Butterworths, 2nd edition, 1979.
V. Vapnik and A. Chervonenkis. Theory of Pattern Recognition [in Russian]. Nauka, 1974. (German Translation: Vapnik, Vladimir and Chervonenkis, Alexey: Theorie der Zeichenerkennung, Akademie-Verlag, 1979).
D. Wagner and B. Schneier. Analysis of the SSL 3.0 protocol. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce (EC-96), pages 29-40. USENIX Association, Nov. 1996.
C. Wright, S. Coull, and F. Monrose. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. In Proceedings of the 14th Annual Network and Distributed Systems Symposium - NDSS '09, San Diego, California, USA, Feb. 2009. The Internet Society.
C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? In Proceedings of the 16th Annual USENIX Security Symposium, pages 43-54, Boston, MA, USA, Aug. 2007.
Wright, C.V. and Ballard, L. and Coull, S.E. and Monrose, F. and Masson, G.M. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. In In Proceedings of the 29th IEEE Symposium on Security and Privacy (IEEE S&P 2008), pages 35-49, Oakland, California, USA, May 2008.