Security and privacy have gained more and more attention with the rapid growth and public acceptance of the Internet as a means of communication and information dissemination. Security and privacy of a computing or network system may be compromised by a variety of well-crafted attacks. In this dissertation, we address issues related to security and privacy in computer network systems. Specifically, we model and analyze a special group of network attacks, known as traffic analysis attacks, and develop and evaluate their countermeasures. Traffic analysis attacks aim to derive critical information by analyzing traffic over a network. We focus our study on two classes of traffic analysis attacks: link-load analysis attacks and flow-connectivity...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
With an increasing amount of internet traffic becoming encrypted, traffic analysis attacks have beco...
Side channels are channels of implicit information flow that can be used to find out information tha...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
Low-latency anonymity preserving networks, such as Tor, are geared towards preserving anonymity of u...
The increase of encrypted traffic on the Internet may become a problem for network-security applicat...
Abstract We present the traffic analysis problem and expose the most important protocols, attacks an...
The recent public disclosure of mass surveillance of electronic communication, involving powerful go...
The recent public disclosure of mass surveillance of electronic communication, involv-ing powerful g...
The threat of traffic analysis attacks against the Tor System is an acknowledged and open research ...
This paper studies countermeasures to traffic analysis attacks. A common strategy for such counterme...
Data analytics is the technique of finding knowledge by examining raw data. It is an important tool ...
In this paper, we address attacks that exploit the timing behavior of TCP and other protocols and ap...
Abstract—Low-latency anonymous communication networks, such as Tor, are geared towards web browsing,...
Linking network flows is an important problem in several security-related applications including int...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
With an increasing amount of internet traffic becoming encrypted, traffic analysis attacks have beco...
Side channels are channels of implicit information flow that can be used to find out information tha...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
Low-latency anonymity preserving networks, such as Tor, are geared towards preserving anonymity of u...
The increase of encrypted traffic on the Internet may become a problem for network-security applicat...
Abstract We present the traffic analysis problem and expose the most important protocols, attacks an...
The recent public disclosure of mass surveillance of electronic communication, involving powerful go...
The recent public disclosure of mass surveillance of electronic communication, involv-ing powerful g...
The threat of traffic analysis attacks against the Tor System is an acknowledged and open research ...
This paper studies countermeasures to traffic analysis attacks. A common strategy for such counterme...
Data analytics is the technique of finding knowledge by examining raw data. It is an important tool ...
In this paper, we address attacks that exploit the timing behavior of TCP and other protocols and ap...
Abstract—Low-latency anonymous communication networks, such as Tor, are geared towards web browsing,...
Linking network flows is an important problem in several security-related applications including int...
We use anonymized flow data collected from a 10Gbps backbone link to discover and analyze malicious ...
With an increasing amount of internet traffic becoming encrypted, traffic analysis attacks have beco...
Side channels are channels of implicit information flow that can be used to find out information tha...