[1] REITER M K, RUBIN A D. Crowds: anonymity for Web transactions[J]. ACM Transactions on Information and System Security, 1998, 1(1): 66-92. [2] DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: the second-generation onion router[R]. Washington, DC: Naval Research Lab, 2004. [3] BOYAN J. The anonymizer-protecting user privacy on the Web[EB/OL]. [2014-10-10]. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.282. [4] CHEN Z, PU S, ZHU S. Traceback technology for anonymous network[J]. Journal of Computer Research and Development, 2012,49(S2):111-117.(陈周国, 蒲石, 祝世雄. 匿名网络追踪溯源综述[J]. 计算机研究与发展, 2012,49(增刊2): 111-117.) [5] YU W, FU X, GRAHAM S, et al. DSSS-based flow marking technique for invisible traceback[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE Press,2007: 18-32. [6] HE G,YANG M, LUO J, et al. Modeling and analysis of time characteristics used in onion routing traceback techniques[J]. Chinese Journal of Computers, 2014,37(2):356-372. (何高峰, 杨明, 罗军舟,等. 洋葱路由追踪技术中时间特征的建模与分析[J]. 计算机学报, 2014, 37(2):356-372. [7] JANSEN R, JOHNSON A. The sniper attack: anonymously deanonymizing and disabling the Tor network[EB/OL]. [2015-04-10]. http://www.dtic.mil/get-tr-doc/pdf?Location=U2&doc=GetTRDoc.pdf&AD=ADA599695. [8] BIRYUKOV A, PUSTOGAROV I, WEINMANN R P. TorScan: tracing long-lived connections and differential scanning attacks[C]//Proceedings of the ESORICS 2012. Berlin: Springer-Verlag, 2012: 469-486. [9] FU X, LING Z, LUO J, et al. One cell is enough to break Tor's anonymity[EB/OL]. [2015-04-10]. http://blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf. [10] LING Z, LUO J, YU W, et al. A new cell counter based attack against Tor[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. New York: ACM Press, 2009: 578-589. [11] BAUER K, McCOY D, GRUNWALD D, et al. Low-resource routing attacks against Tor[C]//Proceedings of the 2007 ACM workshop on Privacy in electronic society. New York: ACM Press,2007: 11-20. [12] BIRYUKOV A, PUSTOGAROV I, WEINMANN R. Trawling for Tor hidden services: detection, measurement, deanonymization[C]//Proceedings of the 2013 IEEE Symposium on Security and Privacy. Piscataway: IEEE Press,2013: 80-94. [13] LING Z, LUO L, YU W, et al. Extensive analysis and large-scale empirical evaluation of Tor bridge discovery[C]//Proceedings of the 2012 IEEE INFOCOM. Piscataway: IEEE Press, 2012: 2381-2389. [14] DANNER N, DeFABBIA-KANE S, KRIZANC D, et al. Effectiveness and detection of denial-of-service attacks in Tor[J]. ACM Transactions on Information and System Security (TISSEC), 2012, 15(3): 11. [15] BAUER K, SHERR M, McCOY D, et al. ExperimenTor: a testbed for safe and realistic Tor experimentation[EB/OL]. [2012-10-10]. https://www.usenix.org/legacy/events/cset11/tech/final_files/Bauer.pdf. |