Empirical tests of anonymous voice over IP

Journal of Network and Computer Applications - Tập 34 - Trang 341-350 - 2011
Marc Liberatore1, Bikas Gurung2, Brian Neil Levine1, Matthew Wright3
1Department of Computer Science, University of Massachusetts Amherst, Amherst, MA, 01003, USA
2Qualcomm, Inc. 5775 Morehouse Drive, San Diego, CA 92121, USA
3Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX 76019, USA

Tài liệu tham khảo

Barbosa R, Kamienski C, Mariz D, Callado A, Fernandes S, Sadok D. Performance evaluation of P2P VoIP applications. In: Proceedings of the ACM NOSSDAV, 2007. Berthold O, Federrath H, Köpsell S. Web MIXes: a system for anonymous and unobservable Internet access. In: Proceedings of the privacy enhancing technology, 2000. Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D. Low-resource routing attacks against Tor. In: ACM WPES, 2007. Cheng A, Friedman E. Sybilproof reputation mechanisms. In: ACM workshop on the economics of peer-to-peer systems, 2005. p. 128–32. Cole RG, Rosenbluth JH. Voice over IP performance monitoring. SIGCOMM Computer Communications Review, 2001, 4 (3). Danezis G. The traffic analysis of continuous-time mixes. In: Proceedings of the privacy enhancing technologies. Lecture notes in computer science, vol. 3424, 2004. p. 35–50. Douceur J. The Sybil attack. In: Proceedings of the IPTPS, 2002. Dingledine R, Mathewson N, Syverson P. Tor: the next-generation onion router. In: Proceedings of the USENIX security symposium, 2004. Feamster N, Dingledine R. Location diversity in anonymity networks. In: Proceedings of the WPES, 2004. Furuya H, Nomoto S, Yamada H, Fukumoto N, Sugaya F. Experimental investigation of the relationship between IP network performances and speech quality of VoIP. In: Proceedings of the international conference on telecommunications (ICT 2003), 2003. Goode B. Voice over Internet protocol (VOIP). In: Proceedings of the IEEE, vol. 90, 2002. p. 1495–517. Hopper N, Vasserman EY, Chan-Tin E. How much anonymity does network latency leak?. In: Proceedings of the ACM CCS, 2007. Intl. Telecommunication Union, ITU-T G.114, One-way transmission time, May 2003. Karopoulos, 2010, A framework for identity privacy in SIP, Journal of Network and Computer Applications, 33, 16, 10.1016/j.jnca.2009.07.004 Kesdogan, 2006, Technical challenges of network anonymity, Computer Communications, 29, 306, 10.1016/j.comcom.2004.12.011 Le Maistre R. Skype: revenue doubles, growth slows, light reading 〈http://www.lightreading.com/document.asp?doc_id=122229〉, April 27, 2007. Levine B, Reiter M, Wang C, Wright M. Timing attacks in low-latency mix systems. In: Proceedings of the financial cryptography, 2004. p. 251—65. Mehta PC, Udani S. Overview of voice over IP. Technical Report MS-CIS-01-31, University of Pennsylvania, February 2001. Markopoulou AP, Tobagi FA, Karam MJ. Assessment of VoIP quality over Internet backbones. In: Proceedings of IEEE INFOCOM, 2002. Murdoch SJ, Danezis G. Low-cost traffic analysis of Tor. In: Proceedings of the IEEE symposium on security and privacy, 2005. Murdoch, 2007, Sampled traffic analysis by Internet-exchange-level adversaries Pfitzmann, 1987, Networks without user observability, Computers & Security, 6, 158, 10.1016/0167-4048(87)90087-3 Reardon J, Goldberg I. Improving Tor using a TCP-over-DTLS tunnel. In: Proceedings of the USENIX security symposium, 2009. Ren, 2010, Survey on anonymous communications in computer networks, Computer Communications, 33, 420, 10.1016/j.comcom.2009.11.009 Rossi, 2009, Understanding Skype signaling, Computer Networks, 53, 130, 10.1016/j.comnet.2008.10.013 Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing. In: 9th privacy enhancing technologies symposium (PETS ’09), 2009. Skevik, 2009, Evaluation of a comprehensive P2P video-on-demand streaming system, Computer Networks, 53, 434, 10.1016/j.comnet.2008.09.025 Snader R, Borisov N. A tune-up for Tor: improving security and performance in the Tor network. In: Proceedings of the NDSS, 2007. Suh K, Figueiredo DR, Kurose J, Towsley D. Characterizing and detecting relayed traffic: a case study using Skype. In: Proceedings of IEEE Infocom, 2006. Tang, 2007, Topology-aware overlay path probing, Computer Communications, 30, 1994, 10.1016/j.comcom.2007.03.004 Tang, 2010, CORS: a cooperative overlay routing service to enhance interactive multimedia communications, Journal of Visual Communication and Image Representation, 21, 107, 10.1016/j.jvcir.2009.06.005 Wang X, Chen S, Jajodia S. Tracking anonymous peer-to-peer VoIP calls on the Internet. In: Proceedings of the ACM CCS, 2005. Wright, 2004, The predecessor attack: an analysis of a threat to anonymous communications systems, ACM TISSEC, 4, 489, 10.1145/1042031.1042032