Systems and methods for decoy routing and covert channel bonding

作者: Gregory Stephen Lauer , David Patrick Mankins , Craig Partridge , William Timothy Strayer , Josh Forrest Karlin

DOI:

关键词:

摘要: Systems, methods, and devices for decoy routing covert channel bonding are described. The system includes a client computing device, router, proxy such that packets addressed to destination re-routed by the router via proxy. method may be applied process, in which plurality of packet data streams sent one or more destinations, appropriately routers and/or proxies, assembled together into single stream at either proxy, final destination.

参考文章(25)
Nick Feamster, Santosh Vempala, Sam Burnett, Chipping away at censorship firewalls with user-generated content usenix security symposium. pp. 29- 29 ,(2010)
David Mazières, Eric Freudenthal, Michael J. Freedman, Democratizing content publication with coral networked systems design and implementation. pp. 18- 18 ,(2004)
Nick Feamster, Hari Balakrishnan, David Karger, Magdalena Balazinska, Greg Harfst, Infranet: Circumventing Web Censorship and Surveillance usenix security symposium. pp. 247- 262 ,(2002)
Liviu Iftode, Arati Baliga, Joe Kilian, A web based covert file system HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems. pp. 12- ,(2007)
Mark Cameron Little, Decoy application servers ,(2010)
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Jennifer Rexford, Josh Karlin, Stephanie Forrest, Nation-State Routing: Censorship, Wiretapping, and BGP arXiv: Networking and Internet Architecture. ,(2009)
K. Butler, T.R. Farley, P. McDaniel, J. Rexford, A Survey of BGP Security Issues and Solutions Proceedings of the IEEE. ,vol. 98, pp. 100- 122 ,(2010) , 10.1109/JPROC.2009.2034031