-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathreferences.bib
435 lines (400 loc) · 23 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
@article{AlternativeToP2P,
author = {Doval, D. and O'Mahony, D.},
journal = {IEEE Internet Computing},
title = {Overlay networks: A scalable alternative for P2P},
year = {2003},
volume = {7},
number = {4},
pages = {79-82},
doi = {10.1109/MIC.2003.1215663},
note = {Letzter Zugriff 03.12.2023}
}
@inproceedings{EvaluationOfEncryptionAlgorithms,
title = {Performance evaluation of various symmetric encryption algorithms},
author = {Kansal, Shaify and Mittal, Meenakshi},
booktitle = {2014 international conference on parallel, distributed and grid computing},
pages = {105--109},
year = {2014},
organization = {IEEE},
doi = {10.1109/PDGC.2014.7030724},
note = {Letzter Zugriff 03.12.2023}
}
@article{EffectivenessOfMixnets,
title = {The effectiveness of mixnets--an empirical study},
author = {Islam, Nazmul and Alam, Kazi Md Rokibul and Rahman, Ashiqur},
journal = {Computer Fraud \& Security},
volume = {2013},
number = {12},
pages = {9--14},
year = {2013},
publisher = {Elsevier},
doi = {https://doi.org/10.1016/S1361-3723(13)70111-8},
url = {https://www.sciencedirect.com/science/article/pii/S1361372313701118},
abstract = {A mixnet is a multi-stage system that accepts encrypted messages as its input and generates a new altered output while exploiting cryptographic operations and repeated permutations to ensure the untraceability between the input and the output messages. Based on the employed cryptographic operations, the main types of mixnets and their variants are: decryption, re-encryption, universal re-encryption and hybrid mixnets. Mixnets offer a degree of anonymity on the Internet by making communications untraceable. Nazmul Islam, Kazi Md Rokibul Alam and Ashiqur Rahman of Khulna University of Engineering and Technology, Bangladesh explain the various kinds of mixnet commonly deployed, and carry out tests to see how they perform. Using the experimental data, they compare the various types to see which offers the best results.},
note = {Letzter Zugriff 03.12.2023}
}
@article{MixnetOptimizationMethods,
title = {Mixnet optimization methods},
author = {Guirat, Iness Ben and Diaz, Claudia},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {1},
pages = {456--477},
year = {2022},
note = {Letzter Zugriff 03.12.2023}
}
@inproceedings{LoopixAnonymitySystem,
author = {Ania M. Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George Danezis},
title = {The Loopix Anonymity System},
booktitle = {26th USENIX Security Symposium (USENIX Security 17)},
year = {2017},
isbn = {978-1-931971-40-9},
address = {Vancouver, BC},
pages = {1199--1216},
url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/piotrowska},
publisher = {USENIX Association},
month = aug,
note = {Letzter Zugriff 03.12.2023}
}
@article{SetupOfVPNChaining,
title = {Dynamic setup of IPsec VPNs in service function chaining},
journal = {Computer Networks},
volume = {160},
pages = {77-91},
year = {2019},
issn = {1389-1286},
doi = {https://doi.org/10.1016/j.comnet.2019.05.015},
url = {https://www.sciencedirect.com/science/article/pii/S1389128619300969},
author = {Håkon Gunleifsen and Thomas Kemmerich and Vasileios Gkioulos},
keywords = {NFV, SFC, NSH, IPsec, IKE, SD-IKE, RESTconf},
abstract = {This article describes a novel mechanism for the automated establishment of dynamic Virtual Private Networks (VPN) in the application domain of Network Function Virtualization (NFV). Each hop in an NFV Service Function Chain (SFC) lacks the capability of per-flow encryption, that makes the traffic flow in federated NFV environments vulnerable for eavesdropping. Due to the possible lack of bidirectional data plane communication channels between VNFs in an SFC, the Internet Security Key Exchange protocol (IPsec-IKE) is not applicable inside a VNF. Hence, this article introduces an alternative to IPsec-IKE that is specifically designed for NFV environments. This component is named Software Defined Security Associations (SD-SA), which is shown through a proof of concept evaluation to perform better than IPsec-IKE with respect to bandwidth and resource consumption.},
note = {Letzter Zugriff 03.12.2023}
}
@phdthesis{CorrelationAttackTor,
title = {Correlation attacks on the Tor network},
author = {Cromb{\'e}, Henri and Declercq, Mallory and Pereira, Olivier and CANINI, Marco and ROCHET, Florentin},
year = {2016},
pages = {7--8},
school = {Master’s thesis, {\'E}cole polytechnique de Louvain (EPL)},
note = {Letzter Zugriff 03.12.2023},
}
@article{AttackInTor,
title = {Review on Attack and Defense in Tor},
author = {Aamir, Muhammad},
journal = {International Journal of Information and Network Security},
volume = {1},
number = {2},
pages = {105},
year = {2012},
publisher = {Citeseer},
note = {Letzter Zugriff 03.12.2023}
}
@article{ScalabilityOfNetworking,
title = {On scalability of software-defined networking},
author = {Yeganeh, Soheil Hassas and Tootoonchian, Amin and Ganjali, Yashar},
journal = {IEEE Communications Magazine},
volume = {51},
number = {2},
pages = {136--141},
year = {2013},
publisher = {Ieee},
doi = {10.1109/MCOM.2013.6461198},
note = {Letzter Zugriff 03.12.2023}
}
@inproceedings{FingerprintingOnTorAttack,
title = {Fingerprinting attack on the tor anonymity system},
author = {Shi, Yi and Matsuura, Kanta},
editor = {Qing, Sihan and Mitchell, Chris J. and Wang, Guilin},
booktitle = {Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings 11},
pages = {425--438},
year = {2009},
organization = {Springer},
publisher = {Springer Berlin Heidelberg},
address = {Berlin, Heidelberg},
abstract = {We present a novel way to implement a fingerprinting attack against Onion Routing anonymity systems such as Tor. Our attack is a realistic threat in the sense that it can be mounted by a single controller of entrance routers and furthermore require very few resources. The conventional fingerprinting attack based on incoming traffic does not work straightforwardly against Tor due to its multiplex and quantized nature of traffic. By contrast, our novel attack can degrade Tor's anonymity by a metric based on both incoming and outgoing packets. In addition, our method keeps the fingerprinting attack's advantage of being realistic in terms of the few required resources. Regarding evaluation, the effectiveness of our method is discussed in a comprehensive manner: experimentally and theoretically. In order to enhance further studies and show the significance of our idea, we also discuss methods for defending against our attack and other applications of our idea.},
isbn = {978-3-642-11145-7},
note = {Letzter Zugriff 03.12.2023}
}
@article{TorWhitePaper,
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
journal = {usenix},
title = {Tor: The Second-Generation Onion Router},
url = {https://www.usenix.org/legacy/event/sec04/tech/full_papers/dingledine/dingledine_html/},
year = {2004},
note = {Letzter Zugriff 03.12.2023}
}
@article{ComposableMixNet,
author = {Douglas Wikström},
journal = {Royal Institute of Technology (KTH)},
title = {A Universally Composable Mix-Net},
year = {2004},
url = {https://link.springer.com/content/pdf/10.1007/978-3-540-24638-1_18.pdf},
note = {Letzter Zugriff 03.12.2023}
}
@article{DefinitionOfVPN,
author = {Paul Ferguson and Geoff Huston},
yournal = {},
title = {What is a {VPN}?},
year = {1998},
abstract = {The term “VPN,” or Virtual Private Network, has become almost as recklessly used in the networking industry as has "QoS" (Quality of Service) to describe a broad set of problems and "solutions," when the objectives themselves have not been properly articulated. This confusion has resulted in a situation where the popular trade press, industry pundits, and vendors and consumers of networking technologies alike, generally use the term “VPN” as an offhand reference for a set of different technologies. This paper attempts to provide a common sense definition of a VPN, and an overview of different approaches to building them.},
publisher = {Revision},
note = {Letzter Zugriff 03.12.2023}
}
@article{FutureOfTheInternet,
title = {Overlay Networks and the Future of the Internet},
author = {Clark, Dave and Lehr, Bill and Bauer, Steve and Faratin, Peyman and Sami, Rahul and Wroclawski, John},
journal = {Communications and Strategies},
volume = {63},
pages = {109},
year = {2006},
publisher = {Citeseer},
url = {https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=edf39c5526b61f33a409e92e5687a7949a36779c},
note = {Letzter Zugriff 03.12.2023}
}
@inproceedings{MIXNetReliability,
author = {Dingledine, Roger and Freedman, Michael J. and Hopwood, David and Molnar, David},
title = {A Reputation System to Increase MIX-Net Reliability},
year = {2001},
pages = {126--141},
abstract = {We describe a design for a reputation system that increases the reliability and thus efficiency of remailer services. Our reputation system uses a MIX-net in which MIXes give receipts for intermediate messages. Together with a set of witnesses, these receipts allow senders to verify the correctness of each MIX and prove misbehavior to the witnesses.},
address = {Berlin, Heidelberg},
booktitle = {Information Hiding},
editor = {Moskowitz, Ira S.},
isbn = {978-3-540-45496-0},
publisher = {Springer Berlin Heidelberg},
note = {Letzter Zugriff 03.12.2023}
}
@inproceedings{VulnerabilitiesInVPNs,
author = {Bui, Thanh and Rao, Siddharth and Antikainen, Markku and Aura, Tuomas},
editor = {Askarov, Aslan and Hansen, Ren{\'e} Rydhof and Rafnsson, Willard},
title = {Client-Side Vulnerabilities in Commercial VPNs},
booktitle = {Secure IT Systems},
year = {2019},
publisher = {Springer International Publishing},
address = {Cham},
pages = {103--119},
abstract = {Internet users increasingly rely on commercial virtual private network (VPN) services to protect their security and privacy. The VPN services route the client's traffic over an encrypted tunnel to a VPN gateway in the cloud. Thus, they hide the client's real IP address from online services, and they also shield the user's connections from perceived threats in the access networks. In this paper, we study the security of such commercial VPN services. The focus is on how the client applications set up VPN tunnels, and how the service providers instruct users to configure generic client software. We analyze common VPN protocols and implementations on Windows, macOS and Ubuntu. We find that the VPN clients have various configuration flaws, which an attacker can exploit to strip off traffic encryption or to bypass authentication of the VPN gateway. In some cases, the attacker can also steal the VPN user's username and password. We suggest ways to mitigate each of the discovered vulnerabilities.},
isbn = {978-3-030-35055-0},
note = {Letzter Zugriff 03.12.2023}
}
@article{OverlayNetwork,
author = {Margaret Rouse},
journal = {TechDictionary},
title = {Overlay {N}etwork},
year = {2016},
url = {https://www.sdxcentral.com/networking/sdn/definitions/whats-network-virtualization/what-is-overlay-networking/},
note = {Letzter Zugriff 03.12.2023}
}
@inproceedings{ComputerNetworkPerformanceAnalysis,
author = {Kim, Y.B. and Vacroux, A.G.},
booktitle = {IEEE International Conference on Communications, Including Supercomm Technical Sessions},
title = {Real-time computer network performance analysis based on ISO/OSI transport service definition},
year = {1990},
volume = {},
number = {},
pages = {1464-1468 vol.4},
doi = {10.1109/ICC.1990.117309},
note = {Letzter Zugriff 03.12.2023}
}
@inproceedings{AttacksOnVPNs,
author = {William J. Tolley and Beau Kujath and Mohammad Taha Khan and Narseo Vallina-Rodriguez and Jedidiah R. Crandall},
title = {Blind {In/On-Path} Attacks and Applications to {VPNs}},
booktitle = {30th USENIX Security Symposium (USENIX Security 21)},
year = {2021},
isbn = {978-1-939133-24-3},
pages = {3129--3146},
url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tolley},
publisher = {USENIX Association},
month = aug,
note = {Letzter Zugriff 04.12.2023}
}
@article{NetworkAddressTranslation,
author = {Wing, Dan},
journal = {IEEE Internet Computing},
title = {Network Address Translation: Extending the Internet Address Space},
year = {2010},
volume = {14},
number = {4},
pages = {66-70},
doi = {10.1109/MIC.2010.96},
note = {Letzter Zugriff 04.12.2023}
}
@inproceedings{BogonFiltering,
title = {Bogons and bogon filtering},
author = {Dietrich, D},
booktitle = {33rd meeting of the North American Network Operator’s Group (NANOG 33)},
year = {2005},
note = {Letzter Zugriff 04.12.2023}
}
@article{MixNetworksSecureApplications,
author = {Sampigethaya, Krishna and Poovendran, Radha},
journal = {Proceedings of the IEEE},
title = {A Survey on Mix Networks and Their Secure Applications},
year = {2006},
volume = {94},
number = {12},
pages = {2142-2181},
doi = {10.1109/JPROC.2006.889687},
note = {Letzter Zugriff 05.12.2023}
}
@inproceedings{OnionRoutingApproaches,
author = {Chauhan, Mayank and Singh, Anuj Kumar and Komal},
editor = {Pandian, A. Pasumpon
and Palanisamy, Ram
and Ntalianis, Klimis},
title = {Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes},
booktitle = {Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019)},
year={2020},
publisher = {Springer International Publishing},
address = {Cham},
pages = {686--697},
abstract = {The rapid advancement of technology has led to the evolution of the Internet, which brought changes in the lives of humans drastically. Since then slowly, all the devices started connecting via the internet user has the freedom and ability to store the information and extract it when needed. But this requires the implementation of active security measures to ensure that the data is confidential and secured. Onion routing was implemented to secure the data from eavesdropping and traffic analysis which guarantees the security of data with the help of private keys. This paper presents a detailed analysis of onion routing algorithms and its variants based on the implementation, features, security concerns and weakness.},
isbn = {978-3-030-43192-1},
note = {Letzter Zugriff 05.12.2023},
}
@misc{TorPadding,
title = {Towards Effective and Efficient Padding Machines for Tor},
author = {Tobias Pulls},
year = {2020},
eprint = {2011.13471},
archivePrefix = {arXiv},
primaryClass = {cs.CR},
note = {Letzter Zugriff 05.12.2023}
}
@article{AttacksOnTor,
title = {De-anonymisation attacks on Tor: A Survey},
author = {Karunanayake, Ishan and Ahmed, Nadeem and Malaney, Robert and Islam, Rafiqul and Jha, Sanjay K},
journal = {IEEE Communications Surveys \& Tutorials},
volume = {23},
number = {4},
pages = {2324--2350},
year = {2021},
publisher = {IEEE},
note = {Letzter Zugriff 05.12.2023},
}
@article{OnionEncryptionMixnet,
title = {Mixnets: Implementation and performance evaluation of decryption and re-encryption types},
author = {Ribarski, Pance and Antovski, Ljupcho},
journal = {Journal of computing and information technology},
volume = {20},
number = {3},
pages = {225--231},
year = {2012},
publisher = {Fakultet elektrotehnike i ra{\v{c}}unarstva Sveu{\v{c}}ili{\v{s}}ta u Zagrebu},
note = {Letzter Zugriff 07.12.2023}
}
@inproceedings{MixnetRouteAlgorithm,
author = {Shu Jiang and Vaidya, N.H.},
booktitle = {2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975)},
title = {A mix route algorithm for mix-net in wireless mobile ad hoc networks},
year = {2004},
volume = {},
number = {},
pages = {406-415},
doi = {10.1109/MAHSS.2004.1392180},
note = {Letzter Zugriff 07.12.2023}
}
@article{MixnetStack,
author = {Chen, Depeng and Borrego, Carlos and Navarro-Arribas, Guillermo},
title = {A Privacy-Preserving Routing Protocol Using Mix Networks in Opportunistic Networks},
journal = {Electronics},
volume = {9},
year = {2020},
number = {11},
article-number = {1754},
url = {https://www.mdpi.com/2079-9292/9/11/1754},
issn = {2079-9292},
abstract = {This paper focuses on the problem of providing anonymous communications in opportunistic networks. To that end, we propose an approach using Mix networks that enables a relatively simple solution. Opportunistic networks present some constraints that make the deployment of typical network anonymity solutions difficult or infeasible. We show, utilizing simulations on the basis of real mobility traces, that the proposed solution is feasible for some scenarios by introducing a tolerable penalty in terms of message delay and delivery. To investigate the impact of routing strategies, we offer two different methods to select Mix nodes. From the experiment results, we show the trade-off between network performance and security.},
doi = {10.3390/electronics9111754},
note = {Letzter Zugriff 07.12.2023}
}
@article{RewardSharingForMixnets,
author = {Diaz, Claudia and Halpin, Harry and Kiayias, Aggelos},
journal = {Cryptoeconomic Systems},
number = {1},
year = {2022},
month = {jun 13},
url = {https://cryptoeconomicsystems.pubpub.org/pub/diaz-reward-sharing-mixnets},
publisher = {},
title = {Reward {Sharing} for {Mixnets}},
volume = {2},
note = {Letzter Zugriff 07.12.2023}
}
@inproceedings{VPNChains,
author = {Vitalii, Tkachov and Anna, Budko and Kateryna, Hvozdetska and Hrebeniuk, Daryna},
booktitle = {2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S\&T)},
title = {Method of Building Dynamic Multi-Hop VPN Chains for Ensuring Security of Terminal Access Systems},
year = {2020},
volume = {},
number = {},
pages = {613-618},
doi = {10.1109/PICST51311.2020.9467953},
note = {Letzter Zugriff 07.12.2023}
}
@inproceedings{BrowserBasedAttacksOnTor,
author = {Abbott, Timothy G. and Lai, Katherine J. and Lieberman, Michael R. and Price, Eric C.},
editor = {Borisov, Nikita and Golle, Philippe},
title = {Browser-Based Attacks on Tor},
booktitle = {Privacy Enhancing Technologies},
year = {2007},
publisher = {Springer Berlin Heidelberg},
address = {Berlin, Heidelberg},
pages = {184--199},
abstract = "This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user's web browser into sending a distinctive signal over the Tor network that can be detected using traffic analysis. It is delivered by a malicious exit node using a man-in-the-middle attack on HTTP. Both the attack and the traffic analysis can be performed by an adversary with limited resources. While the attack can only succeed if the attacker controls one of the victim's entry guards, the method reduces the time required for a traffic analysis attack on Tor from O(nk) to O(n{\thinspace}+{\thinspace}k), where n is the number of exit nodes and k is the number of entry guards. This paper presents techniques that exploit the Tor exit policy system to greatly simplify the traffic analysis. The fundamental vulnerability exposed by this paper is not specific to Tor but rather to the problem of anonymous web browsing itself. This paper also describes a related attack on users who toggle the use of Tor with the popular Firefox extension Torbutton.",
isbn = {978-3-540-75551-7},
note = {Letzter Zugriff 09.12.2023}
}
@article{DisadvantagesOfQualitativApproaches,
title = {The advantages and disadvantages of using qualitative and quantitative approaches and methods in language “testing and assessment” research: A literature review},
author = {Rahman, Md Shidur},
year = {2020},
publisher = {Canadian Center of Science and Education},
doi = {10.5539/jel.v6n1p102},
journal = {Journal of Education and Learning},
volume = {6},
issue = {1},
note = {Letzter Zugriff 13.12.2023}
}
@misc{DefinitionOfAnonymity,
title = {Privacy and Anonymity},
author = {Adrian Yanes},
year = {2014},
eprint = {1407.0423},
archivePrefix = {arXiv},
primaryClass = {cs.CY},
note = {Letzter Zugriff 16.12.2023}
}
@article{PerformanceAndSecurityTor,
author = {Alsabah, Mashael and Goldberg, Ian},
title = {Performance and Security Improvements for Tor: A Survey},
year = {2016},
issue_date = {June 2017},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {49},
number = {2},
issn = {0360-0300},
url = {https://doi.org/10.1145/2946802},
doi = {10.1145/2946802},
abstract = {Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more than three dozen proposals that aim to improve its performance, security, and unobservability. Given the significance of this research area, our goal is to provide the reader with the state of current research directions and challenges in anonymous communication systems, focusing on the Tor network. We shed light on the design weaknesses and challenges facing the network and point out unresolved issues.},
journal = {ACM Comput. Surv.},
month = {sep},
articleno = {32},
numpages = {36},
keywords = {performance, anonymity networks, Privacy-enhancing technologies},
note = {Letzter Zugriff 17.12.2023}
}
@article{VPNCriticalSurvey,
author = {B. H. Priyanka and Ravi Prakash},
title = {A Critical Survey Of Privacy Infrastructures},
journal = {CoRR},
volume = {abs/1512.07207},
year = {2015},
url = {http://arxiv.org/abs/1512.07207},
eprinttype = {arXiv},
eprint = {1512.07207},
timestamp = {Mon, 13 Aug 2018 16:47:46 +0200},
biburl = {https://dblp.org/rec/journals/corr/PriyankaP15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org},
note = {Letzter Zugriff 20.12.2023}
}
@Comment{jabref-meta: databaseType:bibtex;}