Progress in research on active network flow watermark
In face of confirming user communication relationship in anonymous network, tracing botmaster and detecting stepping stones, traditional intrusion detection and flow correlation methods which mainly rely on passive traffic analysis have shown many drawbacks obviously, such as high space costs, poor...
Saved in:
Main Authors: | Xiao-jun GUO, Guang CHENG, Chen-gang ZHU, Dinh-Tu TRUONG, Ai-ping ZHOU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.07.022/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Improved method of Tor network flow watermarks based on IPD interval
by: Jie DU, et al.
Published: (2019-08-01) -
Method of botnet network nodes detection base on communication similarity
by: Yuquan JIN, et al.
Published: (2018-10-01) -
Multiple redundant flow fingerprint model based on time slots
by: Kexian LIU, et al.
Published: (2023-02-01) -
Traditional guidance mechanism based deep robust watermarking
by: Xuejing GUO, et al.
Published: (2023-04-01) -
Navigation Systems May Deteriorate Stability in Traffic Networks
by: Gianluca Bianchin, et al.
Published: (2024-01-01)