Traffic analysis

Known as: Traffic flow security, Traffic-flow security 
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1952-2017
020040019522016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
This article surveys the literature on analyses of mobile traffic collected by operators within their network infrastructure… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Recent work has shown that properties of network traffic that remain observable after encryption, namely packet sizes and timing… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Tor is the second generation onion router supporting the anonymous transport of TCP streams over the Internet. Its low latency… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic analysis methods that detect and… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We apply the information-theoretic anonymity metrics to continuous-time mixes, that individually delay messages instead of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
I present a traffic analysis based vulnerability in SafeWeb, an encrypting web proxy. This vulnerability allows someone… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Destination-based forwarding in traditional IP routers has not been able to take full advantage of multiple paths that frequently… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We present the traffic analysis problem and expose the most important protocols, attacks and design issues. Afterwards, we… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This paper assesses the predictability of network traffic by considering two metrics: 1) how far into the future a traffic rate… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Bruce A. Mah bmah@CS.Berkeley.EDU The Tenet Group Computer Science Division University of California at Berkeley Berkeley, CA… (More)
  • table 2
  • figure 1
  • table 3
  • figure 2
  • figure 3
Is this relevant?