Low-resource routing attacks against tor.
Kevin S. BauerDamon McCoyDirk GrunwaldTadayoshi KohnoDouglas C. SickerPublished in: WPES (2007)
Keyphrases
- secure routing
- countermeasures
- network topology
- web resources
- ad hoc networks
- routing algorithm
- information resources
- resource management
- watermarking scheme
- inter domain
- routing protocol
- attack detection
- terrorist attacks
- traffic engineering
- security threats
- wireless ad hoc networks
- high levels
- resource constraints
- shortest path
- routing problem