Time filter

Source Type

Gu X.-D.,Nanjing Southeast University | Yang M.,Nanjing Southeast University | Luo J.-Z.,Nanjing Southeast University | Jiang P.,Nanjing Public Security Bureau
Jisuanji Xuebao/Chinese Journal of Computers | Year: 2015

As a single-hop anonymous system, SSH proxy is currently widely deployed in the Internet. By establishing an encrypted tunnel between the proxy and its client with dynamic port forwarding, SSH encapsulates all traffic through the tunnel. Hence, the identities of users' destination websites can be hidden. To prevent the anonymity abuse caused by the SSH proxy, the existing work utilized traffic analysis techniques and proposed some website fingerprinting attacks on the target of the homepage. However, several issues should be further well addressed, mainly including how to model the interesting websites and select traffic features with high distinguishability to achieve better accuracy. In this paper, we extract different features of incoming and outgoing flows and present a novel website fingerprinting attack based on hyperlink relations. The main idea is extending the current homepage targeted website fingerprinting attack to subpages. In order to realize the attack, we construct a Hidden Markov Model for the interesting website by simulating users' navigation behaviors. We then evaluate the attack by public dataset and real-world deployment. Our experiments confirm that the website fingerprinting attack based on link relations is able to classify anonymous traces with nearly 96.8% accuracy, which can be used to uncover the real identities of the websites requested by users efficiently. ©, 2015, Science Press. All right reserved.

Chen B.,Nanjing Normal University | Zhang W.-W.,Nanjing Normal University | Yu L.,Nanjing Normal University | Jiang P.,Nanjing Public Security Bureau
ICCSE 2012 - Proceedings of 2012 7th International Conference on Computer Science and Education | Year: 2012

This paper introduces the main technologies of software code protection for.NET, and analyzes their advantages and disadvantages. On the basis of analyzing new demands of.NET software protection, we point out the necessarily and possibility of the trend from code protection to software licensing protection. Then a cloud licensing protection model for.NET software combining code protection with software licensing is presented. This paper provides theoretical and practical guidance for the intellectual property of.NET softwares. © 2012 IEEE.

Wang Y.,Nanjing Public Security Bureau | Geng Q.,Nanjing Public Security Bureau | Zuo Y.,Nanjing Public Security Bureau | Zhou X.,Nanjing Public Security Bureau | And 3 more authors.
Chinese Journal of Chromatography (Se Pu) | Year: 2013

A method for the determination of hydrazine ion in explosion dust of liquid explosive has been established by ion chromatography. The hydrazine ion in an explosion dust sample was extracted with deionized water by soniflcation and centrifugation. The large molecules and solid particles in supernatant were removed by an OnGuard E RP column and a 0. 22 μm filtration membrane, respectively. The filtrate was separated on an lonPac CS-12A column with iso-cratic elution of 5 mmol/L methanesulfonic acid (MSA). Then 0. 1 mol/L NaOH solution was post-column added and the resultant solution was detected by an ampere detector with golden electrode. The results showed that, the calibration curve was linear in the range of 0. 02 - 2. 0 mg/L with a correlation coefficient (r2) of 0. 999 7. The limits of detection (LOD, S/N = 3) and quantification (LOQ, S/N = 10) of hydrazine were 5. 0 μg/L and 16. 6 μg/L, respectively. The recoveries ranged between 95. 4% and 99. 1% with the relative standard deviations (RSDs, n =5) of 2. 196-3. 3o/o. The hydrazine content in a real explosion dust sample of liquid explosive was 10. 3 mg/kg by this method. The method is simple, accurate, and suitable for the quantitative detection of hydrazine ions in explosion dust of liquid explosive, and the method can meet the needs of the criminal evidence identification work.

Discover hidden collaborations