Page 358 - 《软件学报》2021年第10期
P. 358
3330 Journal of Software 软件学报 Vol.32, No.10, October 2021
[17] Panchenko A, Niessen L, Zinnen A, Engel T. Website fingerprinting in onion routing based anonymization networks. In: Proc. of
the 10th Annual ACM Workshop on Privacy in the Electronic Society. New York: ACM, 2011. 103114. [doi: 10.1145/2046556.
2046570]
[18] Cai X, Zhang XC, Joshi B, Johnson R. Touching from a distance: Website fingerprinting attacks and defenses. In: Proc. of the 2012
ACM Conf. on Computer and Communications Security. New York: ACM, 2012. 605616. [doi: 10.1145/2382196.2382260]
[19] Terrell J, Jeffay K, Smith FD, Gogan J, Keller J. Passive, streaming inference of TCP connection structure for network server
management. In: Proc. of the Int’l Workshop on Traffic Monitoring and Analysis. Berlin, Heidelberg: Springer-Verlag, 2009.
4253. [doi: 10.1007/978-3-642-01645-5_6]
[20] Reed A, Kranch M. Identifying https-protected netflix videos in real-time. In: Proc. of the 7th ACM on Conf. on Data and
Application Security and Privacy. New York: ACM, 2017. 361368. [doi: 10.1145/3029806.3029821]
[21] Reed A, Klimkowski B. Leaky streams: Identifying variable bitrate DASH videos streamed over encrypted 802.11n connections. In:
Proc. of the 13th IEEE Annual Consumer Communications & Networking Conf. (CCNC). Piscataway: IEEE, 2016. 11071112.
[doi: 10.1109/CCNC.2016.7444944]
[22] Stikkelorum M. I know what you watched: Fingerprint attack on YouTube video streams. In: Proc. of the 27th Student Conf. on IT.
Enschede, 2017. https://pdfs.semanticscholar.org/2015/26efeb7206e2704b8db46985e4fcb0b93e55.pdf
[23] Gu J, Wang J, Yu Z, Shen K. Walls have ears: Traffic-based side-channel attack in video streaming. In: Proc. of the IEEE
INFOCOM 2018—IEEE Conf. on Computer Communications. Piscataway: IEEE, 2018. 15381546. [doi: 10.1109/INFOCOM.
2018.8486211]
[24] Gu J, Wang J, Yu Z, Shen K. Traffic-based side-channel attack in video streaming. IEEE Trans. on Networking, 2019,27(3):
972985. [doi: 10.1109/TNET.2019.2906568]
[25] Mitra G, Vairam PK, Slpsk P, Chandrachoodan N, Kamakoti V. White mirror: Leaking sensitive information from interactive
netflix movies using encrypted traffic analysis. In: Proc. of the 2019 ACM SIGCOMM Conf. on Posters and Demos, Part of
SIGCOMM. 2019. 122124. [doi: 10.1145/3342280.3342330]
[26] Schuster R, Shmatikov V, Tromer E. Beauty and the burst: Remote identification of encrypted video streams. In: Proc. of the 26th
{USENIX} Security Symp. ({USENIX} Security 2017). San Diego: USENIX Association, 2017. 13571374.
[27] Sodagar I. The MPEG-DASH standard for multimedia streaming over the Internet. IEEE Multimedia, 2011,18(4):6267. [doi:
10.1109/MMUL.2011.71]
[28] Pantos R, May W. RFC8216: HTTP Live Streaming. Fremont: IETF, 2017. https://tools.ietf.org/html/rfc8216
[29] Dierks T, Rescorla E. RFC5246: The Transport Layer Security (TLS) Protocol Version 1.2. Fremont: IETF, 2008. https://tools.ietf.
org/html/rfc5246
附中文参考文献:
[1] 赵博,郭虹,刘勤让,邬江兴.基于加权累积和检验的加密流量盲识别算法.软件学报,2013,24(6):13341345. http://www.jos.org.cn/
1000-9825/4279.htm [doi: 10.3724/SP.J.1001.2013.04279]
[16] 顾晓丹,杨明,罗军舟,蒋平.针对 SSH 匿名流量的网站指纹攻击方法.计算机学报,2015,38(4):833845. [doi: 10.3724/SP.J.1016.
2015.00833]
吴桦(1973-),女,博士,副教授,主要研究 程光 (1973- ), 男 ,博士 ,教授 , 博 士生导
领域为网络测量,网络安全,网络管理. 师,CCF 高级会员,主要研究领域为网络空
间安全监测与防护,网络流量大数据分析,
僵尸网络,APT 攻击检测.
于振华(1993-),男,硕士生,主要研究领域 胡晓艳(1985-),女,博士,讲师,CCF 专业
为网络测量,网络安全. 会员,主要研究领域为网络安全,未来网络
体系结构.