On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Energy consumption of traffic padding schemes in wireless ad hoc networks
Real-time system security
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
ANSS '04 Proceedings of the 37th annual symposium on Simulation
Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Mutual anonymous overlay multicast
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
A new collision-free pseudonym scheme in mobile ad hoc networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Anonymous secure communication in wireless mobile ad-hoc networks
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Improving complex distributed software system availability through information hiding
Proceedings of the 2010 ACM Symposium on Applied Computing
IEEE Journal on Selected Areas in Communications
A design of overlay anonymous multicast protocol
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Empirical and theoretical evaluation of active probing attacks and their countermeasures
IH'04 Proceedings of the 6th international conference on Information Hiding
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Interval-based flow watermarking for tracing interactive traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking
StegoTorus: a camouflage proxy for the Tor anonymity system
Proceedings of the 2012 ACM conference on Computer and communications security
Protocol-level attacks against Tor
Computer Networks: The International Journal of Computer and Telecommunications Networking
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Hi-index | 0.00 |
This paper presents the general approach, design, implementation, and evaluation of NetCamo, which is a system to prevent traffic analysis in systems with real-time requirements. Integrated support for both security and real-time is becoming necessary for computer networks that support mission critical applications. This study focuses on how to integrate both the prevention of traffic analysis and guarantees for worst-case delays in an internetwork. We propose and analyze techniques that efficiently camouflage network traffic and correctly plan and schedule the transmission of payload traffic so that both security and real-time requirements are met. The performance evaluation shows that our NetCamo system is effective and efficient. By using the error between target camouflaged traffic and the observed (camouflaged) traffic as metric to measure the quality of the camouflaging, we show that NetCamo achieves very high levels of camouflaging without compromising real-time requirements