Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 7th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Statistical Identification of Encrypted Web Browsing Traffic
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Integrating Web Caching and Web Prefetching in Client-Side Proxies
IEEE Transactions on Parallel and Distributed Systems
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Inferring the source of encrypted HTTP connections
Proceedings of the 13th ACM conference on Computer and communications security
Modeling Online Browsing and Path Analysis Using Clickstream Data
Marketing Science
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
The Journal of Machine Learning Research
DSSS-Based Flow Marking Technique for Invisible Traceback
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Predicting WWW surfing using multiple evidence combination
The VLDB Journal — The International Journal on Very Large Data Bases
On web browsing privacy in anonymized NetFlows
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Anonymous Networking with Minimum Latency in Multihop Networks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Dependent link padding algorithms for low latency anonymity systems
Proceedings of the 15th ACM conference on Computer and communications security
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Fingerprinting websites using traffic analysis
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Sampled traffic analysis by internet-exchange-level adversaries
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Timing analysis in low-latency mix networks: attacks and defenses
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Anonymous Networking Amidst Eavesdroppers
IEEE Transactions on Information Theory
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Padding and fragmentation for masking packet length statistics
TMA'12 Proceedings of the 4th international conference on Traffic Monitoring and Analysis
Hi-index | 0.00 |
Anonymous web browsing is a hot topic with many potential applications for privacy reasons The current dominant strategy to achieve anonymity is packet padding with dummy packets as cover traffic However, this method introduces extra bandwidth cost and extra delay Therefore, it is not practical for anonymous web browsing applications In order to solve this problem, we propose to use the predicted web pages that users are going to access as the cover traffic rather than dummy packets Moreover, we defined anonymity level as a metric to measure anonymity degrees, and established a mathematical model for anonymity systems, and transformed the anonymous communication problem into an optimization problem As a result, users can find tradeoffs among anonymity level and cost With the proposed model, we can describe and compare our proposal and the previous schemas in a theoretical style The preliminary experiments on the real data set showed the huge potential of the proposed strategy in terms of resource saving.