Locating Tor hidden services through an interval-based traffic-correlation attack.
Juan A. ElicesFernando Pérez-GonzálezPublished in: CNS (2013)
Keyphrases
- voice and data services
- service oriented
- service providers
- denial of service attacks
- temporal reasoning
- dos attacks
- ddos attacks
- web services
- internet service providers
- denial of service
- correlation coefficient
- service composition
- service discovery
- alert correlation
- service delivery
- context aware
- emergency medical services
- normal traffic
- information services
- network traffic
- end to end
- service oriented architecture
- security risks
- resource utilization
- network resources
- computing environments
- real valued
- intrusion detection
- end users