Normalizing Traffic Pattern with Anonymity for Mission Critical Applications

  • Authors:
  • Dongxi Liu;Chi-Hung Chi;Ming Li

  • Affiliations:
  • -;-;-

  • Venue:
  • ANSS '04 Proceedings of the 37th annual symposium on Simulation
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intruders often want to analyze traffic pattern to getinformation for his some malicious activities inultra-secure network. This paper presents a generalapproach to prevent traffic pattern of IP-based networkfrom being analyzed. It is an isolated scheme which canbe used to prevent traffic analysis in overall network byachieving the same goal in each network segmentindependently. On each network segment,complementary traffic is generated according to its realtraffic, and the combination of these two kinds of trafficconstitutes the normalized traffic on each link. Mainadvantages of our approach are, from the performanceviewpoint, 1) complementary traffic does not competeon the bandwidth with real traffic actively, and 2)complementary traffic does not consume the bandwidthof other network segment at all. In addition, byencrypting source and destination IP addresses of eachpacket, anonymous communication can be achieved andanonymous normalized traffic loses its value for theanalysis of eavesdropped traffic by intruders.