Zhu et al., 2009 - Google Patents
Compromising anonymous communication systems using blind source separationZhu et al., 2009
View PDF- Document ID
- 5827467979344272267
- Author
- Zhu Y
- Bettati R
- Publication year
- Publication venue
- ACM Transactions on Information and System Security (TISSEC)
External Links
Snippet
We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks are based on the blind source separation algorithms widely used to recover individual signals from mixtures of signals in statistical signal processing. Since the …
- 238000000926 separation method 0 title abstract description 79
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Authenticating users through fine-grained channel information | |
Shu et al. | Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks | |
Illy et al. | ML-based IDPS enhancement with complementary features for home IoT networks | |
Hsu et al. | A solution to detect the existence of a malicious rogue AP | |
Hu et al. | Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks | |
Kavitha et al. | Anomaly based intrusion detection in wlan using discrimination algorithm combined with naïve Bayesian classifier naïve bayesian classifier. | |
Rong et al. | A novel intrusion detection algorithm for wireless sensor networks | |
Seo et al. | Enhancing the reliability of Wi-Fi network using evil twin AP detection method based on machine learning | |
Zhu et al. | Unmixing mix traffic | |
Zhu et al. | Compromising anonymous communication systems using blind source separation | |
Rajaram et al. | An enhanced deep learning approach for preventing replay attacks in wireless sensor network | |
Reaz et al. | UWB Security and Enhancements | |
Hu et al. | Improving covert storage channel analysis with sdn and experimentation on geni | |
Echchaachoui et al. | A new trust model to secure routing protocols against DoS attacks in MANETs | |
Hamdi et al. | Multilayer statistical intrusion detection in wireless networks | |
Zhu et al. | Compromising location privacy inwireless networks using sensors with limited information | |
Kong et al. | Mobile traffic sensor network versus motion-mix: Tracing and protecting mobile wireless nodes | |
Swathi et al. | Efficient-CSDA (Consensus based) Approach to Achieve Secure Data Aggregation | |
Bhaya et al. | Security against Spoofing Attack in Mobile Ad Hoc Network | |
Rong et al. | An efficient intrusion detection scheme for wireless sensor networks | |
Hassan et al. | Improving security connection in wireless sensor networks | |
Saraswathi et al. | Efficient Approach to Detect Anomaly User in Wireless Network using Grid | |
Sabeel et al. | A novel scheme for multiple spoof attack detection and localization on wsn-based home security system | |
Gour et al. | Detection and Prevention of Wormhole Attack in ALARM Protocol (MANETs) | |
Kumar et al. | Wormhole attack detection and data aggregation algorithm for wireless sensor networks |