{"id":"https://openalex.org/W2802626720","doi":"https://doi.org/10.1515/popets-2018-0020","title":"Secure asymmetry and deployability for decoy routing systems","display_name":"Secure asymmetry and deployability for decoy routing systems","publication_year":2018,"publication_date":"2018-04-28","ids":{"openalex":"https://openalex.org/W2802626720","doi":"https://doi.org/10.1515/popets-2018-0020","mag":"2802626720"},"language":"en","primary_location":{"id":"doi:10.1515/popets-2018-0020","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2018-0020","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2018/3/article-p43.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2018/3/article-p43.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022191380","display_name":"Cecylia Bocovich","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Cecylia Bocovich","raw_affiliation_strings":["Cheriton School of Computer Science, University of Waterloo, Waterloo , Belgium"],"affiliations":[{"raw_affiliation_string":"Cheriton School of Computer Science, University of Waterloo, Waterloo , Belgium","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090953912","display_name":"Ian Goldberg","orcid":"https://orcid.org/0000-0002-1176-2882"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ian Goldberg","raw_affiliation_strings":["Cheriton School of Computer Science, University of Waterloo, Waterloo , Belgium"],"affiliations":[{"raw_affiliation_string":"Cheriton School of Computer Science, University of Waterloo, Waterloo , Belgium","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022191380"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.1999,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.90510511,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"2018","issue":"3","first_page":"43","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6673892736434937},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6258407831192017},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6230732202529907},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6203287839889526},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.5429053902626038},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5123866200447083},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4419620633125305},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.4127025902271271}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6673892736434937},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6258407831192017},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6230732202529907},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6203287839889526},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.5429053902626038},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5123866200447083},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4419620633125305},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.4127025902271271},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/popets-2018-0020","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2018-0020","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2018/3/article-p43.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:538962ff0cfa4652b97338248bfaa793","is_oa":true,"landing_page_url":"https://doaj.org/article/538962ff0cfa4652b97338248bfaa793","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2018, Iss 3, Pp 43-62 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/popets-2018-0020","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2018-0020","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2018/3/article-p43.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.75,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2802626720.pdf","grobid_xml":"https://content.openalex.org/works/W2802626720.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W13103650","https://openalex.org/W139582188","https://openalex.org/W1467762138","https://openalex.org/W1573930428","https://openalex.org/W1603430026","https://openalex.org/W1655958391","https://openalex.org/W2023276871","https://openalex.org/W2024750700","https://openalex.org/W2031211716","https://openalex.org/W2042477294","https://openalex.org/W2043116398","https://openalex.org/W2080100559","https://openalex.org/W2094522125","https://openalex.org/W2108217512","https://openalex.org/W2111695118","https://openalex.org/W2123243822","https://openalex.org/W2124423070","https://openalex.org/W2138194734","https://openalex.org/W2139674816","https://openalex.org/W2149280729","https://openalex.org/W2149541935","https://openalex.org/W2186594794","https://openalex.org/W2209711601","https://openalex.org/W2249146864","https://openalex.org/W2346832320","https://openalex.org/W2397223326","https://openalex.org/W2404168686","https://openalex.org/W2517451064","https://openalex.org/W2532745482","https://openalex.org/W2538755160","https://openalex.org/W2765719031","https://openalex.org/W2767153364","https://openalex.org/W2886749465","https://openalex.org/W3100509983"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4386482731","https://openalex.org/W4229499248","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2566006169","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W2987774938"],"abstract_inverted_index":{"Abstract":[0],"Censorship":[1],"circumvention":[2],"is":[3,61,225],"often":[4,143],"characterized":[5],"as":[6,101],"a":[7,11,25,209,245],"cat-and-mouse":[8],"game":[9],"between":[10],"nation-state":[12],"censor":[13],"and":[14,113,150,169,232,270],"the":[15,33,40,43,65,80,83,87,102,114,117,148,164],"developers":[16],"of":[17,42,67,82,89,119,191,201,263],"censorship":[18,44,198],"resistance":[19,30],"systems.":[20,135,220,277],"Decoy":[21],"routing":[22,160,219],"systems":[23,161,180],"offer":[24],"solution":[26,224],"to":[27,35,50,54,58,94,98,140,197,243,274],"censor-":[28],"ship":[29],"that":[31,76,107,123,162,185,250],"has":[32,92],"potential":[34,130],"tilt":[36],"this":[37,205],"race":[38],"in":[39,79,147,215,252],"favour":[41],"resistor":[45],"by":[46,63],"using":[47],"real":[48],"connections":[49,137],"unblocked,":[51],"overt":[52,141],"sites":[53,142],"deliver":[55],"censored":[56],"content":[57],"users.":[59],"This":[60],"achieved":[62],"employing":[64],"help":[66],"Internet":[68],"Service":[69],"Providers":[70],"(ISPs)":[71],"or":[72,193,199],"Autonomous":[73],"Systems":[74],"(ASes)":[75],"own":[77],"routers":[78,91,106,127,168],"middle":[81],"net-":[84],"work.":[85],"However,":[86],"deployment":[88,99],"decoy":[90,109,159,218],"yet":[93],"reach":[95],"fruition.":[96],"Obstacles":[97],"such":[100],"heavy":[103],"requirements":[104],"on":[105,116,166,267],"deploy":[108,244],"router":[110],"relay":[111,248,264],"stations,":[112],"impact":[115],"quality":[118],"service":[120,202],"for":[121,211,236],"customers":[122],"pass":[124],"through":[125],"these":[126,176],"have":[128,173],"deterred":[129],"participants":[131],"from":[132,138,182],"deploying":[133],"existing":[134,155],"Furthermore,":[136],"clients":[139],"follow":[144],"different":[145],"paths":[146],"upstream":[149],"downstream":[151],"direction,":[152],"making":[153],"some":[154],"designs":[156],"impractical.":[157],"Although":[158],"lessen":[163],"burden":[165],"participating":[167],"accommodate":[170],"asymmetric":[171,223,230],"flows":[172],"been":[174],"proposed,":[175],"arguably":[177],"more":[178,226,240],"deployable":[179],"suffer":[181],"security":[183,272],"vulnerabilities":[184],"put":[186],"their":[187],"users":[188],"at":[189],"risk":[190],"discovery":[192],"make":[194],"them":[195],"prone":[196],"denial":[200],"attacks.":[203],"In":[204],"paper,":[206],"we":[207],"propose":[208],"technique":[210],"supporting":[212],"route":[213],"asymmetry":[214],"previously":[216],"symmetric":[217],"The":[221],"resulting":[222],"secure":[227],"than":[228],"previous":[229],"proposals":[231],"provides":[233],"an":[234,260],"option":[235],"tiered":[237],"deployment,":[238],"allowing":[239],"cautious":[241],"ASes":[242],"lightweight,":[246],"non-blocking":[247],"station":[249,265],"aids":[251],"defending":[253],"against":[254],"routing-capable":[255],"adversaries.":[256],"We":[257],"also":[258],"provide":[259],"experimental":[261],"evaluation":[262],"performance":[266],"off-the-shelf":[268],"hardware":[269],"additional":[271],"improvements":[273],"recently":[275],"proposed":[276]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2018-05-17T00:00:00"}
