[1] E安全. Gartner:2018年全球信息安全支出达到930亿美元[EB/OL].[2018-06-18].http://www.sohu.com/a/165519395_257305.(E security. Gartner: Global information security expenditure reached 93 billion US dollars in 2018[EB/OL].[2018-06-18].http://www.sohu.com/a/165519395_257305.) [2] NURMI J, KANNISTO J, VAJARANTA M. Observing hidden service directory spying with a private hidden service honeynet[C]// Proceedings of the 201611th Asia Joint Conference on Information Security. Piscataway, NJ: IEEE, 2016: 55-59. [3] ERDIN E, ZACHOR C, GUNES M H. How to find hidden users: a survey of attacks on anonymity networks[J]. IEEE Communications Surveys & Tutorials, 2015, 17(4): 2296-2316. [4] SOMMER D, DHAR A, MALISA L, et al. CoverUp: Privacy through "forced" participation in anonymous communication[C]// Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, New York: ACM, 2017: 3. [5] YANG M, LUO J, LING Z, et al. De-anonymizing and countermeasures in anonymous communication networks[J]. IEEE Communications Magazine, 2015, 53(4): 60-66. [6] SHAHBAR K, ZINCIR-HEYWOOD A N. An analysis of tor pluggable transports under adversarial conditions[C]// Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence. Piscataway, NJ: IEEE, 2018: 1-7. [7] HEO H, SHIN S. Who is knocking on the Telnet port: a large-scale empirical study of network scanning[C]// Proceedings of the 2018 on Asia Conference on Computer and Communications Security. New York: ACM, 2018: 625-636. [8] 杨明欣, 蒋玉国, 郭文东. Nmap和分布式扫描技术研究[J]. 电讯技术, 2005(10): 253-256.(YANG M X, JIANG Y G, GUO W D.Research on Nmap and distributed scanning technology[J]. Telecommunication Engineering, 2005(10): 253-256.) [9] MILLER T. Intrusion detection level analysis of Nmap and Queso[EB/OL].[2018-06-10].http://www.stillhq.com/pdfdb/000182/data.pdf. [10] 王平辉,郑庆华,华国林. 基于流量统计特征的端口扫描检测算法[J].通信学报, 2007, 28(12):14-18.(WANG P H,ZHENG Q H,HUA G L. Port scan detection algorithm based on traffic statistics[J].Journal on Communication, 2007, 28(12): 14-18.) [11] AKKIRAJU A, GABAY D, YESILYURT H B, et al. Cybergrenade: automated exploitation of local network machines via single board computers[C]// Proceedings of the 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems. Piscataway, NJ: IEEE, 2017:580-584. [12] HAYES J, TRONCOSO C, DANEZIS G. TASP: Towards anonymity sets that persist[C]// Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society. New York: ACM,2016:177-180. [13] BASU A, CORENA J C, VAIDYA J, et al. Practical private one-way anonymous message routing[C]// Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2015: 665-665. [14] 杨元原, 马文平, 白晓峰. 一种混合的Tor匿名通信系统[J]. 计算机应用研究, 2007, 24(10):141-144.(YANG Y Y,MA W P,BAI X F. A hybrid Tor anonymous communication system[J]. Application Research of Computer, 2007, 24(10):141-144.) [15] TAN Q, GAO Y, SHI J, et al. Towards a comprehensive insight into the eclipse attacks of Tor hidden services[J/OL]. IEEE Internet of Things Journal[2018-06-20]. https://ieeexplore.ieee.org/document/8382237. [16] 周彦伟, 杨启良, 杨波. 一种安全性增强的Tor匿名通信系统[J]. 计算机研究与发展, 2014, 51(7):1538-1546.(ZHOU Y W,YANG Q L,YANG B. A security enhanced Tor anonymous communication system[J]. Journal of Computer Research and Development, 2014, 51(7):1538-1546.) [17] ROHRMANN R R, ERCOLANI V J, PATTON M W. Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range[C]// Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ: IEEE, 2017:185-187. |