Page 358 - 《软件学报》2021年第10期
P. 358

3330                                 Journal of Software  软件学报 Vol.32, No.10, October 2021

                [17]    Panchenko A, Niessen L, Zinnen A, Engel T. Website fingerprinting in onion routing based anonymization networks. In: Proc. of
                     the 10th Annual ACM Workshop on Privacy in the Electronic Society. New York: ACM, 2011. 103114. [doi: 10.1145/2046556.
                     2046570]
                [18]    Cai X, Zhang XC, Joshi B, Johnson R. Touching from a distance: Website fingerprinting attacks and defenses. In: Proc. of the 2012
                     ACM Conf. on Computer and Communications Security. New York: ACM, 2012. 605616. [doi: 10.1145/2382196.2382260]
                [19]    Terrell J, Jeffay K, Smith FD,  Gogan J, Keller J. Passive, streaming  inference of  TCP  connection  structure for network server
                     management. In: Proc.  of  the Int’l Workshop  on Traffic Monitoring and Analysis. Berlin, Heidelberg: Springer-Verlag,  2009.
                     4253. [doi: 10.1007/978-3-642-01645-5_6]
                [20]    Reed  A, Kranch  M. Identifying https-protected netflix videos in real-time. In: Proc. of  the 7th ACM on  Conf. on  Data  and
                     Application Security and Privacy. New York: ACM, 2017. 361368. [doi: 10.1145/3029806.3029821]
                [21]    Reed A, Klimkowski B. Leaky streams: Identifying variable bitrate DASH videos streamed over encrypted 802.11n connections. In:
                     Proc. of the 13th IEEE Annual Consumer Communications & Networking Conf. (CCNC). Piscataway: IEEE, 2016. 11071112.
                     [doi: 10.1109/CCNC.2016.7444944]
                [22]    Stikkelorum M. I know what you watched: Fingerprint attack on YouTube video streams. In: Proc. of the 27th Student Conf. on IT.
                     Enschede, 2017. https://pdfs.semanticscholar.org/2015/26efeb7206e2704b8db46985e4fcb0b93e55.pdf
                [23]    Gu J, Wang  J, Yu Z,  Shen  K.  Walls  have ears: Traffic-based  side-channel  attack in video streaming. In:  Proc. of  the IEEE
                     INFOCOM 2018—IEEE Conf.  on Computer Communications.  Piscataway: IEEE,  2018.  15381546. [doi: 10.1109/INFOCOM.
                     2018.8486211]
                [24]    Gu  J,  Wang J, Yu Z,  Shen K. Traffic-based side-channel attack  in  video  streaming. IEEE Trans.  on Networking,  2019,27(3):
                     972985. [doi: 10.1109/TNET.2019.2906568]
                [25]    Mitra  G, Vairam PK,  Slpsk  P, Chandrachoodan N, Kamakoti  V. White mirror: Leaking  sensitive  information  from  interactive
                     netflix  movies using encrypted traffic  analysis. In: Proc. of the 2019 ACM SIGCOMM  Conf. on Posters  and Demos, Part of
                     SIGCOMM. 2019. 122124. [doi: 10.1145/3342280.3342330]
                [26]    Schuster R, Shmatikov V, Tromer E. Beauty and the burst: Remote identification of encrypted video streams. In: Proc. of the 26th
                     {USENIX} Security Symp. ({USENIX} Security 2017). San Diego: USENIX Association, 2017. 13571374.
                [27]    Sodagar I.  The  MPEG-DASH standard for  multimedia streaming over the Internet. IEEE  Multimedia, 2011,18(4):6267. [doi:
                     10.1109/MMUL.2011.71]
                [28]    Pantos R, May W. RFC8216: HTTP Live Streaming. Fremont: IETF, 2017. https://tools.ietf.org/html/rfc8216
                [29]    Dierks T, Rescorla E. RFC5246: The Transport Layer Security (TLS) Protocol Version 1.2. Fremont: IETF, 2008. https://tools.ietf.
                     org/html/rfc5246
                 附中文参考文献:
                  [1]  赵博,郭虹,刘勤让,邬江兴.基于加权累积和检验的加密流量盲识别算法.软件学报,2013,24(6):13341345. http://www.jos.org.cn/
                     1000-9825/4279.htm [doi: 10.3724/SP.J.1001.2013.04279]
                 [16]  顾晓丹,杨明,罗军舟,蒋平.针对 SSH 匿名流量的网站指纹攻击方法.计算机学报,2015,38(4):833845. [doi: 10.3724/SP.J.1016.
                     2015.00833]



                              吴桦(1973-),女,博士,副教授,主要研究                      程光 (1973- ), 男 ,博士 ,教授 , 博 士生导
                              领域为网络测量,网络安全,网络管理.                           师,CCF 高级会员,主要研究领域为网络空
                                                                           间安全监测与防护,网络流量大数据分析,
                                                                           僵尸网络,APT 攻击检测.


                              于振华(1993-),男,硕士生,主要研究领域                      胡晓艳(1985-),女,博士,讲师,CCF 专业
                              为网络测量,网络安全.                                  会员,主要研究领域为网络安全,未来网络
                                                                           体系结构.
   353   354   355   356   357   358   359   360