Statistical Pattern Recognition: A Review
IEEE Transactions on Pattern Analysis and Machine Intelligence
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Resource Management of the OS Network Subsystem
ISORC '02 Proceedings of the Fifth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Large-scale collection and sanitization of network security data: risks and challenges
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Dependent link padding algorithms for low latency anonymity systems
Proceedings of the 15th ACM conference on Computer and communications security
Probabilistic identification for hard to classify protocol
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Predictive network anomaly detection and visualization
IEEE Transactions on Information Forensics and Security
Evading stepping-stone detection under the cloak of streaming media with SNEAK
Computer Networks: The International Journal of Computer and Telecommunications Networking
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Empirical and theoretical evaluation of active probing attacks and their countermeasures
IH'04 Proceedings of the 6th international conference on Information Hiding
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Timing analysis in low-latency mix networks: attacks and defenses
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Hi-index | 0.00 |
Traffic analysis attacks aim at deriving mission criticalinformation from the analysis of the traffic transmitted overa network. Countermeasures for such attacks are usuallyrealized by properly "padding" the payload traffic so thatthe statistics of the overall traffic become significantly differentfrom that of the payload traffic. In this paper, wepropose a analytical framework for traffic analysis attacksbased on statistical pattern recognition techniques. Westudy the effectiveness of countermeasures for traffic analysisattacks within our proposed framework. Two basic countermeasurestrategies are (a) to pad the traffic with constantinterarrival times of packets (CIT) or (b) to pad thetraffic with variable interarrival times (VIT). Our experimentsshow that CIT countermeasures fail when the adversaryuses sample variance or sample entropy of packet interarrivaltimes for statistical analysis. On the other hand,VIT countermeasures are effective regardless of which samplestatistics are used by the adversary. These observationsare validated by analysis of detection rates based on sampledistributions of packet interarrival times.