Computer Science ›› 2025, Vol. 52 ›› Issue (7): 363-371.doi: 10.11896/jsjkx.240900102
• Information Security • Previous Articles Next Articles
CHEN Shangyu1, HU Hongchao1, ZHANG Shuai1,2, ZHOU Dacheng1,2, YANG Xiaohan1,2
CLC Number:
[1]KARUNANAYAKEI,AHMED N,MALANEY R,et al.De-anonymisation attacks on tor:A survey[J].IEEE Communications Surveys & Tutorials,2021,23(4):2324-2350. [2]NASRM,BAHRAMALI A,HOUMANSADR A.Deepcorr:Strong flow correlation attacks on tor using deep learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:1962-1976. [3]OH S E,YANG T,MATHEWS N,et al.DeepCoFFEA:Im-proved flow correlation attacks on Tor via metric learning and amplification[C]//2022 IEEE Symposium on Security and Privacy(SP).IEEE,2022:1915-1932. [4]AMINUDDINM A I M,ZAABA Z F,SAMSUDIN A,et al.The rise of website fingerprinting on Tor:Analysis on techniques and assumptions[J].Journal of Network and Computer Applications,2023,212:103582. [5]RAHMANS M,SIRINAM P,MATHEWS N,et al.Tik-Tok:The Utility of Packet Timing in Website Fingerprinting Attacks[C]//Proceedings on Privacy Enhancing Technologies.2020:5-24. [6]SIRINAMP,IMANI M,JUAREZ M,et al.Deep fingerprinting:Undermining website fingerprinting defenses with deep learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:1928-1943. [7]SHENM,JI K,GAO Z,et al.Subverting website fingerprinting defenses with robust traffic representation[C]//32nd USENIX Security Symposium(USENIX Security 23).2023:607-624. [8]XIAOX,ZHOU X,YANG Z,et al.A comprehensive analysis of website fingerprinting defenses on Tor[J].Computers & Security,2024,136:103577. [9]ABUSNAINAA,JANG R,KHORMALI A,et al.Dfd:Adver-sarial learning-based approach to defend against website fingerprinting[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.IEEE,2020:2459-2468. [10]HONGX,MA X,LI S,et al.A website fingerprint defense technology with low delay and controllable bandwidth[J].Computer Communications,2022,193:332-345. [11]HENRIS,GARCIA-AVILES G,SERRANO P,et al.Protecting against Website Fingerprinting with Multihoming[C]//Proceedings on Privacy Enhancing Technologies.2020:89-110. [12]DE LA CADENA W,MITSEVA A,HILLER J,et al.Trafficsliver:Fighting website fingerprinting attacks with traffic splitting[C]//Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.2020:1971-1985. [13]BARTON A,WRIGHT M.DeNASA:Destination-Naive AS-Awareness in Anonymous Communications[C]//Proceedings on Privacy Enhancing Technologies,2016:356-372. [14]LYU M,ZHU Y F,LIN W.Dynamic Routing Algorithm Basedon Bandwidth of Anonymous Network[J].Journal of Information Engineering University,2019,20(5):591-596. [15]FENG Q,XIA Y,YAO W,et al.Malicious Relay Detection forTor Network Using Hybrid Multi-Scale CNN-LSTM with Attention[C]//2023 IEEE Symposium on Computers and Communications(ISCC).IEEE,2023:1242-1247. [16]ROCHET f,WAILSR,JOHNSON A,et al.CLAPS:Client-location-aware path selection in Tor[C]//Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.2020:17-34. |
[1] | ZHANG Yuekang, SHE Yanhong. Hierarchical Classification with Multi-path Selection Based on Calculation of Correlation Degree of Granularity Categories in the Same Level [J]. Computer Science, 2025, 52(7): 119-126. |
[2] | SUI Jiaqi, HU Hongchao, SHI Xin, ZHOU Dacheng, CHEN Shangyu. Tor Network Path Selection Algorithm Based on Similarity Perception [J]. Computer Science, 2025, 52(3): 391-399. |
[3] | CHEN Hongwei, YIN Xiaokang, GAI Xianzhe, JIA Fan, LIU Shengli, CAI Ruijie. New Type of UDP Reflection Amplification Protocol Recognition Method Based on Active-Passive Combination [J]. Computer Science, 2024, 51(8): 412-419. |
[4] | ZHANG Zhongxin, YI Ming, XIAO Shuaifang. Key Generation Scheme Based on RIS Multipath Random Superposition [J]. Computer Science, 2024, 51(5): 414-420. |
[5] | PANG Xing-long, ZHU Guo-sheng. Survey of Network Traffic Analysis Based on Semi Supervised Learning [J]. Computer Science, 2022, 49(6A): 544-554. |
[6] | DONG Chao-ying, XU Xin, LIU Ai-jun, CHANG Jing-hui. New Routing Methods of LEO Satellite Networks [J]. Computer Science, 2020, 47(12): 285-290. |
[7] | GUO Qi, CUI Jing-song. Covert Communication Method Based on Closed Source Streaming Media [J]. Computer Science, 2019, 46(9): 150-155. |
[8] | ZHANG Jin-hui, DENG Qian, LI Zhen-yu. Study on Application of Network Coding and Multipath Transmission in Internet Live Video Broadcasting [J]. Computer Science, 2019, 46(8): 171-177. |
[9] | QIN Kuang-yu, HUANG Chuan-he, LIU Ke-wei, SHI Jiao-li and CHEN Xi. Multipath Routing Algorithm in Software Defined Networking Based on Multipath Broadcast Tree [J]. Computer Science, 2018, 45(1): 211-215. |
[10] | YAN Jun-ya, QIAN Yu-hua, LI Hua-feng and MA Shang-cai. Node Localization Based on Multipath Distance and Neural Network in WSN [J]. Computer Science, 2017, 44(8): 71-75. |
[11] | NONG Huang-wu, HUANG Chuan-he and HUANG Xiao-peng. SDN-based Multipath Routing Algorithm for Fat-tree Data Center Networks [J]. Computer Science, 2016, 43(6): 32-34. |
[12] | WANG Jun, DU Wei-qi, LIU Hui and WANG Lei. Multipath Routing Protocol Based on Braid-multipath Network Coding Model for Wireless Sensor Networks [J]. Computer Science, 2016, 43(11): 135-141. |
[13] | WANG Shao-hui, JIANG Ji-hong and XIAO Fu. New Design of Rerouting-based Anonymous Communication System [J]. Computer Science, 2016, 43(10): 154-159. |
[14] | ZHU Wei-na, ZHOU Jie, CAI Shi-qing and SHEN Xiao-yan. Research on Channel Esitimation of Scattering Channel Models in Mobile Communication Macrocell Environments [J]. Computer Science, 2016, 43(10): 87-92. |
[15] | DU Wen-feng and WU Zhen. Data Distribution Algorithm with Out-of-order Feedback for CMT over Diversity Network [J]. Computer Science, 2015, 42(3): 60-64. |
|