[ Pobierz całość w formacie PDF ]

be possible to accommodate users who do not adhere to the link structure by
introducing strong and weak transitions rather than a binary transition matrix,
where strong transitions are assigned high likelihood and represent actual links
on a website and weak transitions join all unlinked pages and are assigned low
likelihood. In this way the HMM will allow transitions outside of the site graph
provided that the classifier issues a very confident prediction.
Defense development and evaluation also require further exploration. At-
tack evaluation conditions and defense development are somewhat related since
conditions which favor attack performance will simultaneously decrease defense
effectiveness. Defense evaluation under conditions which favor attack creates the
appearance that defenses must be complex and expensive, effectively discourag-
ing defense deployment. To increase likelihood of deployment, future work must
investigate necessary defense measures under increasingly realistic conditions
since realistic conditions may substantially contribute to effective defense.
This work has involved substantial implementation, data collection and com-
putation. To facilitate future comparative work, our data collection infrastruc-
ture, traffic samples, attack and defense implementations and results are avail-
able upon request.
References
1. A. Hintz,  Fingerprinting Websites Using Traffic Analysis, in Proc. Privacy En-
hancing Technologies Conference, 2003.
2. Q. Sun, D. R. Simon, Y.-M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu,
 Statistical Identification of Encrypted Web Browsing Traffic, in Proc. IEEE
S&P, 2002.
3. D. Herrmann, R. Wendolsky, and H. Federrath,  Website Fingerprinting: Attack-
ing Popular Privacy Enhancing Technologies with the Multinomial Naive-Bayes
Classifier, in Proc. of ACM CCSW, 2009.
4. X. Cai, X. C. Zhang, B. Joshi, and R. Johnson,  Touching From a Distance: Web-
site Fingerprinting Attacks and Defenses, in Proc. of ACM CCS, 2012.
5. K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton,  Peek-a-Boo, I Still See
You: Why Efficient Traffic Analysis Countermeasures Fail, in Proc IEEE S&P,
2012.
6. M. Liberatore and B. N. Levine,  Inferring the Source of Encrypted HTTP Con-
nections, in Proc. ACM CCS, 2006.
7. G. Bissias, M. Liberatore, D. Jensen, and B. N. Levine,  Privacy Vulnerabilities
in Encrypted HTTP Streams, in Proc. PETs Workshop, May 2005.
8. A. Panchenko, L. Niessen, A. Zinnen, and T. Engel,  Website Fingerprinting in
Onion Routing Based Anonymization Networks, in Proc. ACM WPES, 2011.
9. T. Wang and I. Goldberg,  Improved Website Fingerprinting on Tor, in Proc. of
ACM WPES 2013.
10. H. Cheng and R. Avnur,  Traffic Analysis of SSL Encrypted Web Browsing,
http://www.cs.berkeley.edu/
ronathan-heyning.ps, 1998.
11. G. Danezis,  Traffic Analysis of the HTTP Protocol over TLS, http://research.
microsoft.com/en-us/um/people/gdane/papers/TLSanon.pdf.
12. Jobs heart attack rumor not true, Apple stock swings. http://news.cnet.com/
8301-13579 3-10057521-37.html.
13. In-the-Closet Lesbian Sues Netflix for Releasing Her
Movie Preferences. http://gizmodo.com/5429348/in+the+
closet-lesbian-sues-netflix-for-releasing-her-movie-preferences.
14. Netflix Class Action Settlement: Service Pays $9 Million After Alle-
gations Of Privacy Violations. http://www.huffingtonpost.com/2012/02/11/
netflix-class-action-settlement{ n }1270230.html.
15. 18 USC 2710. http://www.law.cornell.edu/uscode/text/18/2710.
16. A Company Promises the Deepest Data Mining Yet. http://www.nytimes.com/
2008/03/20/business/media/20adcoside.html?ref=business& r=0.
17. American ISPs already sharing data with outside ad firms. http://www.theregister.
co.uk/2008/04/10/american isps embrace behavioral ad targeting/.
18. Hotel s Free Wi-Fi Comes With Hidden Extras. http://bits.blogs.nytimes.com/
2012/04/06/courtyard-marriott-wifi/? php=true& type=blogs& r=0.
19. Introduction To Electronic Monitoring in the Workplace. https://www.aclu.org/
racial-justice womens-rights/legislative-briefing-kit-electronic-monitoring.
20. Whistleblowers Expose FDA s Illegal Surveillance of Employee. http:
//www.whistleblowers.org/index.php?option=com content{&}task=view{&}
id=1334{&}Itemid=71.
21. Leak: Government spies snooped in  Warcraft, other games. http://www.cnn.com/
2013/12/09/tech/web/nsa-spying-video-games/.
22. NSA: Some used spying power to snoop on lovers. http://www.cnn.com/2013/09/
27/politics/nsa-snooping/.
23. Prism  World news  The Guardian. http://www.theguardian.com/world/
prism.
24. XKeyscore: NSA tool collects  nearly everything a user does on the internet . http:
//www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data.
25. China Tries Even Harder to Censor the Internet. http://www.businessweek.com/
articles/2013-09-12/china-tries-even-harder-to-censor-the-internet.
26. Here s how Iran censors the Internet. http://www.washingtonpost.com/blogs/ [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • helpmilo.pev.pl
  •