{"id":"https://openalex.org/W2094096834","doi":"https://doi.org/10.1109/tifs.2012.2226579","title":"On the Security of End-to-End Measurements Based on Packet-Pair Dispersions","display_name":"On the Security of End-to-End Measurements Based on Packet-Pair Dispersions","publication_year":2012,"publication_date":"2012-10-26","ids":{"openalex":"https://openalex.org/W2094096834","doi":"https://doi.org/10.1109/tifs.2012.2226579","mag":"2094096834"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2012.2226579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2012.2226579","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059087800","display_name":"Ghassan Karame","orcid":"https://orcid.org/0000-0002-2828-4071"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"G. O. Karame","raw_affiliation_strings":["ETH Zurich, Z\u00fcrich, Switzerland","ETH Z\u00fcrich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Zurich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]},{"raw_affiliation_string":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088014188","display_name":"Boris Danev","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"B. Danev","raw_affiliation_strings":["Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081867547","display_name":"C. Bannwart","orcid":"https://orcid.org/0000-0003-4784-9557"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"C. Bannwart","raw_affiliation_strings":["Electrical Engineering Department, ETH Zurich, Z\u00fcrich, Switzerland","Electr. Eng. Dept., ETH Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, ETH Zurich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]},{"raw_affiliation_string":"Electr. Eng. Dept., ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077290467","display_name":"Sr\u0111jan \u010capkun","orcid":"https://orcid.org/0000-0001-5727-3673"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"S. Capkun","raw_affiliation_strings":["Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059087800"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":2.5688,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90416183,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"8","issue":"1","first_page":"149","last_page":"162"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8504905700683594},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7060728669166565},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6573418974876404},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5579655170440674},{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.47895532846450806},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4477616548538208},{"id":"https://openalex.org/keywords/end-to-end-delay","display_name":"End-to-end delay","score":0.43927374482154846},{"id":"https://openalex.org/keywords/processing-delay","display_name":"Processing delay","score":0.43806034326553345},{"id":"https://openalex.org/keywords/transmission-delay","display_name":"Transmission delay","score":0.4158868193626404},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39737969636917114}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8504905700683594},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7060728669166565},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6573418974876404},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5579655170440674},{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.47895532846450806},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4477616548538208},{"id":"https://openalex.org/C37624559","wikidata":"https://www.wikidata.org/wiki/Q5375776","display_name":"End-to-end delay","level":3,"score":0.43927374482154846},{"id":"https://openalex.org/C21434264","wikidata":"https://www.wikidata.org/wiki/Q7247320","display_name":"Processing delay","level":4,"score":0.43806034326553345},{"id":"https://openalex.org/C108921912","wikidata":"https://www.wikidata.org/wiki/Q7834639","display_name":"Transmission delay","level":3,"score":0.4158868193626404},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39737969636917114},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2012.2226579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2012.2226579","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W187748090","https://openalex.org/W1510304841","https://openalex.org/W1512493269","https://openalex.org/W1520914943","https://openalex.org/W1601795611","https://openalex.org/W1621679620","https://openalex.org/W1765711557","https://openalex.org/W1966819490","https://openalex.org/W2025651888","https://openalex.org/W2056363353","https://openalex.org/W2080219160","https://openalex.org/W2104599106","https://openalex.org/W2107300034","https://openalex.org/W2113446256","https://openalex.org/W2114785657","https://openalex.org/W2120324404","https://openalex.org/W2130673717","https://openalex.org/W2135570031","https://openalex.org/W2138629529","https://openalex.org/W2139684699","https://openalex.org/W2140963311","https://openalex.org/W2146491632","https://openalex.org/W2149462483","https://openalex.org/W2156632496","https://openalex.org/W2226679990","https://openalex.org/W4245906277","https://openalex.org/W4285719527","https://openalex.org/W6630888505","https://openalex.org/W6630973029","https://openalex.org/W6637754965","https://openalex.org/W6677573608","https://openalex.org/W6679554851"],"related_works":["https://openalex.org/W2169254439","https://openalex.org/W2390947672","https://openalex.org/W4366679797","https://openalex.org/W2185485139","https://openalex.org/W2008110221","https://openalex.org/W2384308992","https://openalex.org/W2552037046","https://openalex.org/W854358031","https://openalex.org/W1507138195","https://openalex.org/W1969998969"],"abstract_inverted_index":{"The":[0,15],"packet-pair":[1,19,51,85,99,152,171,187],"technique":[2,20,40,100,110,140,188],"is":[3],"a":[4,13,114,151,160],"widely":[5],"adopted":[6],"method":[7],"to":[8,44,62,66,113,133],"estimate":[9],"the":[10,18,71,78,84,91,98,148,168,186,194],"capacity":[11],"of":[12,17,80,108,117,150,170,196],"path.":[14],"use":[16],"has":[21],"been":[22],"suggested":[23],"in":[24,55,70],"numerous":[25],"applications":[26],"including":[27],"network":[28],"management":[29],"and":[30,101,173,179],"end-to-end":[31],"admission":[32],"control.":[33],"Recent":[34],"observations":[35],"also":[36],"indicate":[37],"that":[38,50,105,185],"this":[39,74,109],"can":[41,123,141,189],"be":[42],"used":[43],"fingerprint":[45],"Internet":[46],"paths.":[47],"However,":[48],"given":[49],"measurements":[52,65,81],"are":[53,111],"performed":[54],"an":[56],"open":[57],"environment,":[58],"end-hosts":[59,122],"might":[60],"try":[61],"alter":[63],"these":[64],"increase":[67],"their":[68,126],"gain":[69],"network.":[72],"In":[73],"paper,":[75],"we":[76,89,102,174],"explore":[77],"security":[79],"based":[82],"on":[83,136],"technique.":[86],"More":[87],"specifically,":[88],"analyze":[90],"major":[92],"threats":[93],"against":[94],"bandwidth":[95,118,137,155],"estimation":[96],"using":[97,167],"demonstrate":[103],"empirically":[104],"current":[106],"implementations":[107],"vulnerable":[112],"wide":[115],"range":[116],"manipulation":[119],"attacks-in":[120],"which":[121],"accurately":[124],"modify":[125],"claimed":[127],"bandwidths.":[128],"We":[129,157],"propose":[130,159],"lightweight":[131],"countermeasures":[132],"detect":[134,142],"attacks":[135],"measurements;":[138],"our":[139],"whether":[143],"delays":[144],"were":[145],"inserted":[146],"within":[147],"transmission":[149],"(e.g.,":[153],"by":[154],"shapers).":[156],"further":[158],"novel":[161],"scheme":[162],"for":[163],"remote":[164,197],"path":[165],"identification":[166],"distribution":[169],"dispersions":[172],"evaluate":[175],"its":[176],"accuracy,":[177],"robustness,":[178],"potential":[180],"use.":[181],"Our":[182],"findings":[183],"suggest":[184],"reveal":[190],"valuable":[191],"information":[192],"about":[193],"identity/locations":[195],"hosts.":[198]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
