首页> 外文期刊>Future generation computer systems >Detect Slitheen by analyzing the browsing behaviors and forcing retransmission
【24h】

Detect Slitheen by analyzing the browsing behaviors and forcing retransmission

机译:通过分析浏览行为并强制重新传输来检测Slitheen

获取原文
获取原文并翻译 | 示例

摘要

Previous studies on decoy routing did not consider the impact of content delivery networks (CDN). The CDN are widely used by popular websites which should not be ignored. In this paper, we take the first step to study the problem of applying the decoy routing in the CDN. In detail, we take Slitheen, which is one of the most advanced decoy routing techniques as our research object, and design the detection attacks from the following aspects: replacing the CDN edge servers; analyzing retransmission latency; comparing ciphertexts; analyzing the page loading duration. If Slitheen exposes its users to the censor, they will be in great danger in some repressive regimes. In order to reinforce Slitheen, we propose attack plans from the perspective of the attacker. To the best knowledge of the authors, our work is the first research on decoy routing in the CDN. By simulations, we demonstrate the feasibility of our detection scheme. We show that using our attack methods, the packet-sending frequency, the retransmission delay, and the page loading durations of Slitheen sessions are all obviously different from regular ones.
机译:先前有关诱饵路由的研究并未考虑内容交付网络(CDN)的影响。 CDN被流行的网站广泛使用,不应忽略。在本文中,我们迈出第一步来研究在CDN中应用诱骗路由的问题。详细地讲,我们将最先进的诱饵路由技术之一Slitheen作为研究对象,并从以下几个方面设计检测攻击:替换CDN边缘服务器;分析重传延迟;比较密文;分析页面加载持续时间。如果Slitheen将其用户暴露给审查员,则在某些压制性政权中,他们将处于极大的危险之中。为了加强Slitheen,我们从攻击者的角度提出了攻击计划。据作者所知,我们的工作是CDN中有关诱饵路由的第一项研究。通过仿真,我们证明了检测方案的可行性。我们证明,使用攻击方法,Slitheen会话的数据包发送频率,重传延迟和页面加载持续时间都明显不同于常规会话。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号