Sciweavers

116 search results - page 8 / 24
» Deep packet anonymization
Sort
View
PET
2005
Springer
14 years 1 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch
ANCS
2007
ACM
13 years 11 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
14 years 2 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
SAC
2010
ACM
13 years 8 months ago
Improving cost and accuracy of DPI traffic classifiers
Traffic classification through Deep Packet Inspection (DPI) is considered extremely expensive in terms of processing costs, leading to the conclusion that this technique is not su...
Niccolo Cascarano, Luigi Ciminiera, Fulvio Risso
DISCEX
2003
IEEE
14 years 1 months ago
ANON: An IP-Layer Anonymizing Infrastructure
This exhibition demonstrates an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anon...
Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott Br...