[go: up one dir, main page]

Zhu et al., 2009 - Google Patents

Compromising anonymous communication systems using blind source separation

Zhu et al., 2009

View PDF
Document ID
5827467979344272267
Author
Zhu Y
Bettati R
Publication year
Publication venue
ACM Transactions on Information and System Security (TISSEC)

External Links

Snippet

We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks are based on the blind source separation algorithms widely used to recover individual signals from mixtures of signals in statistical signal processing. Since the …
Continue reading at engagedscholarship.csuohio.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Liu et al. Authenticating users through fine-grained channel information
Shu et al. Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks
Illy et al. ML-based IDPS enhancement with complementary features for home IoT networks
Hsu et al. A solution to detect the existence of a malicious rogue AP
Hu et al. Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks
Kavitha et al. Anomaly based intrusion detection in wlan using discrimination algorithm combined with naïve Bayesian classifier naïve bayesian classifier.
Rong et al. A novel intrusion detection algorithm for wireless sensor networks
Seo et al. Enhancing the reliability of Wi-Fi network using evil twin AP detection method based on machine learning
Zhu et al. Unmixing mix traffic
Zhu et al. Compromising anonymous communication systems using blind source separation
Rajaram et al. An enhanced deep learning approach for preventing replay attacks in wireless sensor network
Reaz et al. UWB Security and Enhancements
Hu et al. Improving covert storage channel analysis with sdn and experimentation on geni
Echchaachoui et al. A new trust model to secure routing protocols against DoS attacks in MANETs
Hamdi et al. Multilayer statistical intrusion detection in wireless networks
Zhu et al. Compromising location privacy inwireless networks using sensors with limited information
Kong et al. Mobile traffic sensor network versus motion-mix: Tracing and protecting mobile wireless nodes
Swathi et al. Efficient-CSDA (Consensus based) Approach to Achieve Secure Data Aggregation
Bhaya et al. Security against Spoofing Attack in Mobile Ad Hoc Network
Rong et al. An efficient intrusion detection scheme for wireless sensor networks
Hassan et al. Improving security connection in wireless sensor networks
Saraswathi et al. Efficient Approach to Detect Anomaly User in Wireless Network using Grid
Sabeel et al. A novel scheme for multiple spoof attack detection and localization on wsn-based home security system
Gour et al. Detection and Prevention of Wormhole Attack in ALARM Protocol (MANETs)
Kumar et al. Wormhole attack detection and data aggregation algorithm for wireless sensor networks