{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T22:48:01Z","timestamp":1769640481979,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642316791","type":"print"},{"value":"9783642316807","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31680-7_4","type":"book-chapter","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T13:40:32Z","timestamp":1340804432000},"page":"58-78","source":"Crossref","is-referenced-by-count":35,"title":["Website Detection Using Remote Traffic Analysis"],"prefix":"10.1007","author":[{"given":"Xun","family":"Gong","sequence":"first","affiliation":[]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[]},{"given":"Negar","family":"Kiyavash","sequence":"additional","affiliation":[]},{"given":"Nabil","family":"Schear","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/948205.948219","volume-title":"3rd ACM SIGCOMM Conference on Internet Measurement","author":"A. Akella","year":"2003","unstructured":"Akella, A., Seshan, S., Shaikh, A.: An empirical evaluation of wide-area Internet bottlenecks. In: Crovella, M. (ed.) 3rd ACM SIGCOMM Conference on Internet Measurement, pp. 101\u2013114. ACM, New York (2003), \n                    \n                      http:\/\/dl.acm.org\/citation.cfm?id=948205.948219"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11767831_1","volume-title":"Privacy Enhancing Technologies","author":"G.D. Bissias","year":"2006","unstructured":"Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy Vulnerabilities in Encrypted HTTP Streams. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 1\u201311. Springer, Heidelberg (2006)"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/SITIS.2008.93","volume-title":"IEEE International Conference on Signal Image Technology and Internet Based Systems","author":"S. Chakravarty","year":"2008","unstructured":"Chakravarty, S., Stavrou, A., Keromytis, A.D.: Identifying proxy nodes in a Tor anonymization circuit. In: Dipanda, A., Chbeir, R., Yetongnon, K. (eds.) IEEE International Conference on Signal Image Technology and Internet Based Systems, pp. 633\u2013639. IEEE Computer Society, Los Alamitos (2008)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Chen, S., Wang, R., Wang, X., Zhang, K.: Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. In: Evans, D., Vigna, G. (eds.) IEEE Symposium on Security and Privacy, pp. 191\u2013206. IEEE Computer Society (May 2010), \n                    \n                      http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5504714","DOI":"10.1109\/SP.2010.20"},{"key":"4_CR5","unstructured":"Cheng, H., Avnur, R.: Traffic Analysis of SSL Encrypted Web Browsing (1998), \n                    \n                      http:\/\/www.cs.berkeley.edu\/~daw\/teaching\/cs261-f98\/projects\/final-reports\/ronathan-heyning.ps"},{"key":"4_CR6","volume-title":"16th USENIX Security Symposium","author":"S.E. Coull","year":"2007","unstructured":"Coull, S.E., Collins, M.P., Wright, C.V., Monrose, F., Reiter, M.K.: On web browsing privacy in anonymized netflows. In: Provos, N. (ed.) 16th USENIX Security Symposium. USENIX Association, Berkeley (2007), \n                    \n                      http:\/\/www.usenix.org\/events\/sec07\/tech\/coull.html"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-30114-1_21","volume-title":"Information Hiding","author":"G. Danezis","year":"2004","unstructured":"Danezis, G., Serjantov, A.: Statistical Disclosure or Intersection Attacks on Anonymity Systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 293\u2013308. Springer, Heidelberg (2004), \n                    \n                      http:\/\/www.springerlink.com\/index\/TQLJB3HYBK4RUBLA.pdf"},{"key":"4_CR8","first-page":"303","volume-title":"USENIX Security Symposium","author":"R. Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Blaze, M. (ed.) USENIX Security Symposium, pp. 303\u2013320. USENIX Association, San Diego (2004), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=1251396"},{"key":"4_CR9","unstructured":"Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on Tor using long paths. In: Monrose, F. (ed.) 18th USENIX Security Symposium, pp. 33\u201350. USENIX Association (August 2009), \n                    \n                      http:\/\/www.usenix.org\/events\/sec09\/tech\/full_papers\/evans.pdf"},{"key":"4_CR10","first-page":"375","volume-title":"14th ACM Conference on Computer and Communications Security","author":"J. Franklin","year":"2007","unstructured":"Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of Internet miscreants. In: De Capitani di Vemarcati, S., Syverson, P. (eds.) 14th ACM Conference on Computer and Communications Security, pp. 375\u2013388. ACM, New York (2007), \n                    \n                      http:\/\/dl.acm.org\/citation.cfm?id=1315245.1315292"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1655008.1655013","volume-title":"ACM Workshop on Cloud Computing Security","author":"D. Herrmann","year":"2009","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\u00efve-Bayes classifier. In: ACM Workshop on Cloud Computing Security, pp. 31\u201342. ACM, Chicago (2009), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=1655013"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-36467-6_13","volume-title":"Privacy Enhancing Technologies","author":"A. Hintz","year":"2003","unstructured":"Hintz, A.: Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 171\u2013178. Springer, Heidelberg (2003), \n                    \n                      http:\/\/www.springerlink.com\/index\/C4QWE6D608P2CJYV.pdf"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/1315245.1315257","volume-title":"14th ACM Conference on Computer and Communications Security","author":"N. Hopper","year":"2007","unstructured":"Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? In: De Capitani di Vimercati, S., Syverson, P. (eds.) 14th ACM Conference on Computer and Communications Security, pp. 82\u201391. ACM, New York (2007), \n                    \n                      http:\/\/dl.acm.org\/citation.cfm?id=1315245.1315257"},{"key":"4_CR14","unstructured":"Hopper, N., Vasserman, E., Chan-Tin, E.: How much anonymity does network latency leak? ACM Transactions on Information and System Security\u00a013(2) (2010), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=1698753"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Kadloor, S., Gong, X., Kiyavash, N., Tezcan, T., Borisov, N.: Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks. In: Xiao, C., Olivier, J.C. (eds.) 2010 IEEE International Conference on Communications. IEEE (May 2010), \n                    \n                      http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=5501972","DOI":"10.1109\/ICC.2010.5501972"},{"key":"4_CR16","first-page":"101","volume-title":"Proceedings of the 2003 ACM SIGCOMM Conference on Internet Measurement, IMC 2003","author":"K. Lakshminarayanan","year":"2003","unstructured":"Lakshminarayanan, K., Padmanabhan, V.N.: Some findings on the network performance of broadband hosts. In: Crovella, M. (ed.) Proceedings of the 2003 ACM SIGCOMM Conference on Internet Measurement, IMC 2003, pp. 101\u2013114. ACM Press, New York (2003), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?doid=948205.948212"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/1180405.1180437","volume-title":"13th ACM Conference on Computer and Communications Security","author":"M. Liberatore","year":"2006","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: Wright, R., De Capitani di Vemarcati, S. (eds.) 13th ACM Conference on Computer and Communications Security, pp. 255\u2013263. ACM, New York (2006), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=1180437"},{"key":"4_CR18","unstructured":"Lyon, G.F.: Nmap Network Scanning. Nmap Project (1999)"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/SP.2005.12","volume-title":"2005 IEEE Symposium on Security and Privacy","author":"S. Murdoch","year":"2005","unstructured":"Murdoch, S., Danezis, G.: Low-Cost Traffic Analysis of Tor. In: Paxson, V., Waidner, M. (eds.) 2005 IEEE Symposium on Security and Privacy, pp. 183\u2013195. IEEE Computer Society, Berkeley (2005), \n                    \n                      http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=1425067"},{"issue":"6","key":"4_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MNET.2003.1248658","volume":"17","author":"R. Prasad","year":"2003","unstructured":"Prasad, R., Davrolis, C., Murray, M., Claffy, K.: Bandwidth estimation: metrics, measurement techniques, and tools. IEEE Network\u00a017(6), 27\u201335 (2003), \n                    \n                      http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=1248658","journal-title":"IEEE Network"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/644527.644537","volume-title":"ACM Workshop on Privacy in Electronic Society","author":"M. Rennhard","year":"2002","unstructured":"Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. In: Samarati, P. (ed.) ACM Workshop on Privacy in Electronic Society, pp. 91\u2013102. ACM Press, New York (2002), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=644537"},{"key":"4_CR22","unstructured":"Ribeiro, V., Riedi, R., Baraniuk, R., Navratil, J., Cottrell, L.: pathchirp: Efficient available bandwidth estimation for network paths. In: Passive and Active Measurement Workshop, vol.\u00a04. Citeseer (March 2003)"},{"issue":"1","key":"4_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/251007.251012","volume":"27","author":"L. Rizzo","year":"1997","unstructured":"Rizzo, L.: Dummynet: a simple approach to the evaluation of network protocols. ACM SIGCOMM Computer Communication Review\u00a027(1), 31\u201341 (1997), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?doid=251007.251012","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"1","key":"4_CR24","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TASSP.1978.1163055","volume":"26","author":"H. Sakoe","year":"1978","unstructured":"Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing\u00a026(1), 43\u201349 (1978), \n                    \n                      http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=1163055","journal-title":"IEEE Transactions on Acoustics, Speech, and Signal Processing"},{"key":"4_CR25","unstructured":"Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: Privacy trends in consumer ubiquitous computing. In: Provos, N. (ed.) 16th USENIX Security Symposium, pp. 55\u201370. USENIX Association (2007), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=1362908"},{"issue":"3","key":"4_CR26","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/90.502236","volume":"4","author":"M. Shreedhar","year":"1996","unstructured":"Shreedhar, M., Varghese, G.: Efficient fair queuing using deficit round-robin. IEEE\/ACM Transactions on Networking\u00a04(3), 375\u2013385 (1996), \n                    \n                      http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=502236","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"4_CR27","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and SSH timing attacks. In: Wallach, D.S. (ed.) 10th USENIX Security Symposium. USENIX Association (August 2001), \n                    \n                      http:\/\/www.usenix.org\/events\/sec01\/song.html"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/948205.948211","volume-title":"3rd ACM SIGCOMM Conference on Internet Measurement","author":"J. Strauss","year":"2003","unstructured":"Strauss, J., Katabi, D., Kaashoek, F.: A measurement study of available bandwidth estimation tools. In: Crovella, M. (ed.) 3rd ACM SIGCOMM Conference on Internet Measurement, pp. 39\u201344. ACM, New York (2003), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=948211"},{"key":"4_CR29","unstructured":"Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted Web browsing traffic. In: Abadi, M., Bellovin, S.M. (eds.) IEEE Symposium on Security and Privacy, pp. 19\u201330. IEEE Computer Society (May 2002), \n                    \n                      http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=1004359"},{"key":"4_CR30","unstructured":"Wagner, D., Schneier, B.: Analysis of the SSL 3.0 Protocol. In: Tygar, D. (ed.) USENIX Workshop on Electronic Commerce. USENIX Association (November 1996), \n                    \n                      http:\/\/www.usenix.org\/publications\/library\/proceedings\/ec96\/wagner.html"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"White, A.M., Matthews, A.R., Snow, K.Z., Monrose, F.: Phonotactic reconstruction of encrypted VoIP conversations: Hookt on Foniks. In: Vigna, G., Jha, S. (eds.) IEEE Symposium on Security and Privacy, pp. 3\u201318. IEEE Computer Society (May 2011), \n                    \n                      http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=5958018","DOI":"10.1109\/SP.2011.34"},{"key":"4_CR32","first-page":"35","volume-title":"IEEE Symposium on Security and Privacy","author":"C.V. Wright","year":"2008","unstructured":"Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In: IEEE Symposium on Security and Privacy, pp. 35\u201349. IEEE Computer Society, Washington, DC (2008), \n                    \n                      http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=4531143"},{"issue":"4","key":"4_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1880022.1880029","volume":"13","author":"C.V. Wright","year":"2010","unstructured":"Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Uncovering Spoken Phrases in Encrypted Voice over IP Conversations. ACM Transactions on Information and System Security\u00a013(4), 1\u201330 (2010), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/1880022.1880029","journal-title":"ACM Transactions on Information and System Security"},{"key":"4_CR34","unstructured":"Zhang, K., Wang, X.: Peeping Tom in the neighborhood: Keystroke eavesdropping on multi-user systems. In: Monrose, F. (ed.) 18th USENIX Security Symposium USENIX Security. USENIX Association (August 2009), \n                    \n                      http:\/\/www.usenix.org\/events\/sec09\/tech\/full_papers\/zhang.pdf"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/11767831_8","volume-title":"Privacy Enhancing Technologies","author":"Y. Zhu","year":"2006","unstructured":"Zhu, Y., Bettati, R.: Unmixing Mix Traffic. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 110\u2013127. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31680-7_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:43:39Z","timestamp":1620114219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31680-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316791","9783642316807"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31680-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}