Proceedings of the Symposium on SDN Research 2017
DOI: 10.1145/3050220.3050232
|View full text |Cite
|
Sign up to set email alerts
|

iTAP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Existing research shows that Tor's defense against some network attacks is not efficient, such as traffic analysis [16], replay attacks [17], and so on. As the current research on attacks against anonymity systems is mainly focused on the Tor systems, such as traffic analysis attacks [18,19], this makes the security of Tor itself a new research issue. The performance problems of Tor also lead to relevant research which is devoted to improving the communication performance and security of Tor, such as [20,21].…”
Section: Related Workmentioning
confidence: 99%
“…Existing research shows that Tor's defense against some network attacks is not efficient, such as traffic analysis [16], replay attacks [17], and so on. As the current research on attacks against anonymity systems is mainly focused on the Tor systems, such as traffic analysis attacks [18,19], this makes the security of Tor itself a new research issue. The performance problems of Tor also lead to relevant research which is devoted to improving the communication performance and security of Tor, such as [20,21].…”
Section: Related Workmentioning
confidence: 99%
“…In SDN, "new control functions can be implemented by writing software-based logic in the control plane which deploys the decision logic in the forwarding plane through standard interfaces" [1]. This also allows to implement functionality that is "[a]kin to onion routing" [55]. The authors of [55] use the SDN to implement logic that rewrites packet headers to increase the privacy by hiding the actual flow of messages an observer on the network.…”
Section: Flexible Network Architecturesmentioning
confidence: 99%
“…This also allows to implement functionality that is "[a]kin to onion routing" [55]. The authors of [55] use the SDN to implement logic that rewrites packet headers to increase the privacy by hiding the actual flow of messages an observer on the network. The authors of [29] propose to "move onion-routing technique to the SDN" and it "builds onion-routed tunnels over multiple anonymity service providers and through many SDNs" [29].…”
Section: Flexible Network Architecturesmentioning
confidence: 99%