Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Prateek MittalAhmed KhurshidJoshua JuenMatthew CaesarNikita BorisovPublished in: CCS (2011)
Keyphrases
- low latency
- traffic analysis
- anonymous communication
- network security
- incentive mechanism
- high throughput
- high speed
- real time
- network traffic
- highly efficient
- virtual machine
- stream processing
- traffic data
- computer networks
- internet traffic
- free riding
- knowledge sharing
- databases
- end to end
- response time
- np hard
- image sequences