Entry Danner:2012:EDD from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Danner:2012:EDD,
author = "Norman Danner and Sam Defabbia-Kane and Danny Krizanc
and Marc Liberatore",
title = "Effectiveness and detection of denial-of-service
attacks in {Tor}",
journal = j-TISSEC,
volume = "15",
number = "3",
pages = "11:1--11:??",
month = nov,
year = "2012",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2382448.2382449",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Wed Nov 28 17:25:14 MST 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Tor is one of the more popular systems for anonymizing
near-real-time communications on the Internet. Borisov
et al. [2007] proposed a denial-of-service-based attack
on Tor (and related systems) that significantly
increases the probability of compromising the anonymity
provided. In this article, we analyze the effectiveness
of the attack using both an analytic model and
simulation. We also describe two algorithms for
detecting such attacks, one deterministic and proved
correct, the other probabilistic and verified in
simulation.",
acknowledgement = ack-nhfb,
articleno = "11",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- al.,
2(1)3,
2(1)34,
9(2)181,
9(4)461,
10(2)6,
10(4)5,
11(3)14,
13(4)37,
14(3)27,
16(3)10,
18(3)10
- algorithm,
1(1)26,
2(1)3,
2(1)65,
2(1)105,
2(3)295,
9(2)162,
9(4)391,
9(4)421,
10(1)4,
10(4)3,
11(1)4,
11(3)12,
12(2)8,
12(3)17,
12(4)20,
13(1)10,
13(3)20,
13(3)22,
13(3)24,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
13(4)41,
14(1)3,
14(1)13,
14(3)25,
15(4)15,
15(4)17,
16(1)4,
17(3)11,
17(4)13,
18(1)1,
18(1)4,
18(4)14
- analytic,
11(4)19
- analyze,
2(3)230,
2(4)416,
9(4)421,
10(1)4,
10(3)9,
10(4)5,
11(2)1,
11(2)3,
11(3)14,
11(3)15,
11(4)23,
12(3)16,
12(3)17,
13(3)27,
15(1)5,
15(2)8,
16(3)10,
16(4)16,
16(4)17,
18(1)1,
18(1)2,
18(1)3,
18(2)5
- anonymity,
1(1)66,
2(3)230,
2(4)354,
2(4)390,
11(2)3,
11(2)6,
12(3)15,
13(2)13,
13(4)29,
13(4)39,
13(4)41,
14(1)4,
14(4)29,
15(1)5,
15(3)12,
15(3)14,
17(1)4
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- both,
1(1)26,
1(1)93,
2(1)65,
2(4)416,
9(2)181,
10(1)4,
10(3)12,
11(1)3,
11(1)4,
11(2)2,
11(3)14,
11(3)15,
11(3)16,
11(4)22,
12(1)2,
12(2)13,
12(3)15,
12(4)20,
13(4)30,
13(4)33,
14(3)24,
15(1)5,
15(2)10,
15(3)13,
16(1)4,
16(2)5,
16(3)10,
16(4)17,
17(3)9,
18(1)1,
18(4)13,
18(4)14
- communications,
7(4)489,
11(2)3,
12(2)7,
13(2)11,
14(1)5,
15(1)1,
16(3)10,
17(3)9
- compromising,
2(3)269,
10(2)6,
11(3)13,
13(1)8,
15(2)9,
16(4)17,
17(2)7
- correct,
10(2)6,
13(3)27,
15(2)10,
16(1)1,
17(2)7
- denial-of-service,
10(3)9,
15(4)16,
17(1)4
- describe,
1(1)66,
2(1)3,
2(1)34,
2(1)105,
2(2)159,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
7(2)319,
10(4)3,
11(4)21,
12(1)1,
12(2)11,
12(3)16,
12(4)21,
13(4)30,
13(4)34,
14(3)24,
14(3)27,
15(3)13,
16(3)10,
16(3)12,
16(4)14,
17(2)5,
18(2)8
- detecting,
4(1)1,
11(2)2,
11(3)12,
11(4)19,
14(1)2,
14(2)21,
16(2)5
- detection,
2(2)159,
2(3)295,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
5(3)203,
6(2)173,
6(4)443,
7(4)591,
9(1)61,
10(1)4,
11(2)2,
11(3)12,
11(3)15,
11(4)19,
11(4)20,
12(2)11,
12(2)12,
12(2)13,
12(4)22,
13(2)12,
13(4)30,
14(1)13,
14(3)27,
15(2)6,
15(4)17,
17(4)13,
17(4)15,
18(1)2,
18(2)7,
18(3)9
- deterministic,
12(2)10,
18(2)7
- effectiveness,
10(4)4,
10(4)6,
11(3)12,
11(4)22,
12(2)12,
15(3)12,
17(3)9
- et,
2(1)3,
2(1)34,
9(2)181,
9(4)461,
10(2)6,
10(4)5,
11(3)14,
13(4)37,
14(3)27,
16(3)10,
18(3)10
- increase,
11(4)20,
12(3)18,
14(1)3,
15(1)5,
16(2)8,
18(4)14
- Internet,
2(3)332,
2(4)390,
7(2)242,
11(2)5,
12(2)13,
12(3)17,
13(4)38,
17(1)4,
17(3)12,
17(4)16
- more,
2(1)3,
2(1)65,
2(3)332,
9(2)181,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(3)9,
10(4)1,
10(4)4,
10(4)6,
11(2)3,
11(2)4,
11(2)6,
11(3)14,
11(4)21,
12(1)1,
12(2)8,
12(2)10,
12(2)12,
12(2)13,
12(3)18,
13(1)10,
13(3)20,
13(3)21,
13(3)22,
13(3)28,
13(4)32,
13(4)34,
13(4)39,
14(3)27,
14(4)31,
15(1)2,
15(1)5,
15(2)8,
15(2)9,
15(3)12,
15(4)16,
16(1)2,
16(2)8,
16(3)10,
16(3)11,
16(4)17,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)16,
18(1)1,
18(3)11,
18(4)13
- of-service, denial-,
10(3)9,
15(4)16,
17(1)4
- one,
1(1)26,
1(1)93,
2(1)3,
2(1)65,
2(3)295,
9(4)461,
10(1)2,
10(2)5,
10(2)8,
10(3)12,
10(4)3,
11(2)6,
11(3)14,
12(1)1,
12(1)5,
12(2)13,
12(3)14,
13(3)21,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)3,
14(1)5,
14(4)30,
14(4)32,
15(2)10,
15(4)16,
15(4)18,
16(1)3,
16(1)4,
16(3)9,
16(4)14,
17(2)8,
17(4)13,
18(1)1,
18(3)11,
18(4)13
- other,
1(1)93,
2(4)354,
9(4)461,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)1,
10(4)5,
11(2)2,
11(2)6,
11(3)15,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)10,
12(3)14,
12(3)17,
12(4)22,
13(3)24,
13(3)25,
13(4)40,
14(3)23,
14(3)27,
14(4)30,
15(1)5,
15(2)6,
15(3)14,
15(4)15,
16(4)15,
17(2)8,
17(3)9,
18(1)1,
18(1)3,
18(2)6,
18(4)12
- popular,
10(4)5,
14(3)27,
15(2)8,
15(2)10,
15(4)16,
16(4)13,
17(3)11,
17(4)15,
18(1)1
- probabilistic,
11(3)13,
11(4)18,
14(1)12,
15(3)14,
15(4)15
- probability,
11(3)13,
12(1)5,
12(2)13,
16(3)11,
17(3)9,
17(4)15,
18(1)2
- proposed,
1(1)93,
2(2)138,
2(3)269,
2(4)416,
4(3)224,
9(2)162,
9(4)421,
10(1)2,
10(3)12,
10(4)4,
11(1)2,
11(1)3,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(3)18,
12(4)21,
13(3)20,
13(3)27,
13(3)28,
13(4)36,
13(4)38,
13(4)39,
14(3)24,
14(3)27,
15(1)5,
15(3)13,
15(4)15,
15(4)17,
16(3)10,
16(3)11,
16(4)14,
16(4)16,
17(1)3,
17(4)14,
18(3)11
- proved,
2(3)332,
18(2)8
- provided,
11(4)22,
12(3)14,
13(4)35,
16(1)4,
16(3)12,
17(3)9
- related,
9(4)421,
10(2)5,
10(4)2,
13(3)27,
15(2)7,
16(2)7
- service, denial-of-,
10(3)9,
15(4)16,
17(1)4
- significantly,
1(1)93,
9(2)181,
9(4)461,
11(2)3,
12(3)17,
13(4)29,
14(1)7,
15(1)4,
15(2)9,
15(2)10,
16(3)9,
17(1)1,
18(1)1
- simulation,
10(4)6,
11(2)3,
11(3)13,
11(3)15,
11(4)18,
11(4)22,
14(1)3,
17(3)9
- Tor,
13(4)29
- two,
1(1)26,
2(4)416,
9(4)391,
10(1)4,
10(2)6,
10(2)8,
10(3)10,
10(4)4,
11(2)1,
11(2)4,
11(2)6,
11(3)13,
11(4)22,
12(1)2,
12(1)3,
12(1)4,
12(1)6,
12(3)14,
12(4)20,
13(3)22,
13(3)27,
13(4)40,
14(1)4,
14(1)5,
14(4)30,
15(1)2,
15(1)5,
15(2)6,
15(3)12,
16(1)1,
16(1)2,
16(1)4,
16(3)9,
16(3)10,
16(4)15,
17(4)13,
18(2)5,
18(4)12,
18(4)13,
18(4)14
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- verified,
2(3)332,
9(2)138,
13(3)26,
15(1)3,
16(4)17,
18(2)7