Government agencies rely more and more heavily on the availability of flexible and intelligent solutions for the interception and analysis of Internet-based telecommunications. Unfortunately, the global lawful interception market has been recently put into a corner by the emerging sophisticated encryption, obfuscation and anonymization technologies provided by modern overlay communication infrastructures. To face this challenge, this work proposes a novel strategy for defeating the anonymity of traffic flows, collected within and at the exit of these anonymizing networks, relying on distributed flow-capture, characterization and correlation attacks driven by wavelet-based multi-resolution analysis. Such a strategy, starting from a properly ...
Abstract — This paper focuses on the active watermarking technique, which has been active in the p...
Distributed denial-of-service attack (DDoS) as one of the most common Internet attacks today is an a...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
Government agencies rely more and more heavily on the availability of flexible and intelligent solut...
In this paper, we address attacks that exploit the timing behavior of TCP and other protocols and ap...
Abstract — Mix networks are designed to provide anonymity for users in a variety of applications, in...
Abstract. We investigate the feasibility of mounting a de-anonymization attack against Tor and simil...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
Low-latency anonymity preserving networks, such as Tor, are geared towards preserving anonymity of u...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although ...
Large datasets of real network flows acquired from the Internet are an invaluable resource for the r...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
The recent public disclosure of mass surveillance of electronic communication, involv-ing powerful g...
Abstract. DoS/DDoS attacks especially the Link Flooding have ex-erted severe threat on Internet. In ...
Abstract—Deciding that two network flows are essentially the same is an important problem in intrusi...
Abstract — This paper focuses on the active watermarking technique, which has been active in the p...
Distributed denial-of-service attack (DDoS) as one of the most common Internet attacks today is an a...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
Government agencies rely more and more heavily on the availability of flexible and intelligent solut...
In this paper, we address attacks that exploit the timing behavior of TCP and other protocols and ap...
Abstract — Mix networks are designed to provide anonymity for users in a variety of applications, in...
Abstract. We investigate the feasibility of mounting a de-anonymization attack against Tor and simil...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
Low-latency anonymity preserving networks, such as Tor, are geared towards preserving anonymity of u...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although ...
Large datasets of real network flows acquired from the Internet are an invaluable resource for the r...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
The recent public disclosure of mass surveillance of electronic communication, involv-ing powerful g...
Abstract. DoS/DDoS attacks especially the Link Flooding have ex-erted severe threat on Internet. In ...
Abstract—Deciding that two network flows are essentially the same is an important problem in intrusi...
Abstract — This paper focuses on the active watermarking technique, which has been active in the p...
Distributed denial-of-service attack (DDoS) as one of the most common Internet attacks today is an a...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...