최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기융합보안논문지 = Convergence security journal, v.21 no.3, 2021년, pp.31 - 38
임형석 (국방대학교 국방과학학과) , 이수진 (국방대학교 국방과학학과)
Tor, known as Onion Router, guarantees strong anonymity. For this reason, Tor is actively used not only for criminal activities but also for hacking attempts such as rapid port scan and the ex-filtration of stolen credentials. Therefore, fast and accurate detection of Tor traffic is critical to prev...
A. Gupta, S. B. Maynard, and A. Ahmad, "The Dark Web Phenomenon: A Review and Research Agenda", ACIS 2019 Proceedings, 1, 2019.
Kristin Finklea, "Dark Web", U. S. Congressional Research Service Report, 2017. 3.
S. Kaur and S. Randhawa, "Dark Web: A Web of Crimes", Wireless Personal Communications, Vol. 112, 2020.
K. Rathod, and H. Suthar, "Traffic Analysis and Relay Finding in Tor Survey", Multidisciplinary International Research Journal of Gujarat Technological University, Vol. 2, No. 1, pp. 34-43, 2020.
L. Basyoni, N. Fetais, A. Erbad, A. Mohamed, and M. Guizani, "Traffic analysis attacks on Tor: a survey", 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 183-188, 2020
AhnLab, "ASEC REPORT VOL. 50", https://www.ahnlab.com/kr/site/securityinfo/asec/asecReportList.do, 검색일: 2020. 8. 5, pp.1-25, 2014.
D. Moore, and T. Rid, "Cryptopolitik and the Darknet", Survival, Vol.58, no.1, pp.20-25, 2016.
Z. Cao, G. Xiong, Y. Zhao, Z. Li, and l. Guo, "A Survey on Encrypted Traffic Classification", International Conference on Applications and Techniques in Information Security, pp. 73-81, 2014.
Y. Shin, and S. Shin, "An Empirical Study on Massive Forensic Services", Internet and Information Security, Vol.1, No.4, pp. 83-100, 2010.
M. Kim, "Limitations and Improvements of Adoption Criteria for Digital Forensic Evidence", Convergence Security Journal, Vol.18, No.4, pp. 36-43, 2018.
T. Wang, and I. Goldberg, "Improved website fingerprinting on tor", Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, pp. 201-202, 2013.
V. Rimmer, D. preuveneers, M. Juarez, T. Van Goethem, and W. Joosen, "Automated Website Fingerprinting through Deep Learning", arXiv preprint arXiv:1708.06376, pp. 1-15, 2017.
H. Oh, D. Hwang, and W. Kim, "Traffic Sequence Vectorization and Ensemble Algorithm Classification for Tor Website Fingerprinting", Journal of The Institute of Electronics and Information Engineers Vol. 57, No. 5, pp. 59-61, 2020.
A. Montieri, D. Ciuonzo, G. Aceto, and A. Pescape, "Anonymity Services Tor, I2P, JonDonym: Classifying the Dark (Web)", IEEE Transactions on Dependable and Secure Computing, Vol.17, No.3, pp. 1-14, 2018.
A. Lashkari, H. Draper-Gil, M. S. I. Mamun, and A. Ali, "Characterization of Tor Traffic using Time based Features", International Conference on Information Systems, Security and Privacy(ICISSp), pp. 253-263, 2017.
A. Panchenko, F. Lanze, J. Pennekamp, T. Engel, A. Zinnen, M. Henze, and K. Wehrle, "Website Fingerprinting at Internet Scale", Network and Distributed System Security Symposium(NDSS), pp. 1-15, 2016.
M. Kim, and A. Anpalagan, "Tor Traffic Classification from Raw Packet Header using Convolutional Neural Network", 2018 1st IEEE International Conference on Knowledge Innovation and Invention(ICKII), pp. 187-190, 2018.
University of New Brunswick, "Tor-nonTor dataset (ISCXTor2016)", https://www.unb.ca/cic/datasets/andmal2017.html, 2016.(검색일 : 2020. 7. 5)
V. Nair, and G. E. Hinton, "Rectified Linear Units Improve Restricted Boltzmann Machines", International Conference on Machine Learning (ICML), pp. 807-814, 2010.
Kingma, P. Diederik, and Jimmy Ba, "Adam: A Method For Stochastic Optimization", arXiv preprint arXiv:1412.6980, pp. 1-15, 2015.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.