IEEE INFOCOM 2018 - IEEE Conference on Computer Communications 2018
DOI: 10.1109/infocom.2018.8486375
|View full text |Cite
|
Sign up to set email alerts
|

Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…An attacker such as an LEA can obtain this information from the service providers via legal procedures. Iacovazzi et al [108] introduce an inverse flow watermarking attack called INFLOW to de-anonymise HSs. They argue that in previous watermarking attacks, the attack was only effective in tracking watermarks from source to destination, as a watermark only travels in the direction of the traffic flow.…”
Section: Hybridmentioning
confidence: 99%
See 1 more Smart Citation
“…An attacker such as an LEA can obtain this information from the service providers via legal procedures. Iacovazzi et al [108] introduce an inverse flow watermarking attack called INFLOW to de-anonymise HSs. They argue that in previous watermarking attacks, the attack was only effective in tracking watermarks from source to destination, as a watermark only travels in the direction of the traffic flow.…”
Section: Hybridmentioning
confidence: 99%
“…Overdorf et al conclude that WF attacks are successful on HSs and certain HSs are more likely to be de-anonymised based on factors such as the size and the dynamics of the HS. The more recent watermark attacks on HSs [108], [109] are reported to be effective. These attacks exploit Tor's congestion control mechanism and, having been tested against more recent versions of Tor, present a major threat to the anonymity of HSs.…”
Section: Hybridmentioning
confidence: 99%
“…Security [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [21], [58], [59], [60], [61], [62], [63], [64], [19] 28…”
Section: Research Fieldmentioning
confidence: 99%
“…Another paper showing an attack based on the fact that it is possible to control the entry node is by [46] who mentions that Tor has a TCP/Tor congestion management mechanism. This mechanism causes a data source to stop sending messages, until it receives an acknowledgement of receipt of a previous message.…”
Section: Securitymentioning
confidence: 99%
“…It only observes the communication process to infer the relationship between users. Active traffic analysis [11,12,16,18,20,28] is mainly to artificially interfere with the traffic, and to achieve neither the purpose of exposure nor the means of intervention. There are some typical digital watermark model, such as packet transmission rate based watermark, inter packet watermark and packet sending interval watermark.…”
Section: Related Workmentioning
confidence: 99%