On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Self-similarity in World Wide Web traffic: evidence and possible causes
IEEE/ACM Transactions on Networking (TON)
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Self-similar processes in communications networks
IEEE Transactions on Information Theory
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Survey on anonymity in unstructured peer-to-peer systems
Journal of Computer Science and Technology
ICNC'06 Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II
Hi-index | 0.00 |
Intruders often want to analyze traffic pattern to getinformation for his some malicious activities inultra-secure network. This paper presents a generalapproach to prevent traffic pattern of IP-based networkfrom being analyzed. It is an isolated scheme which canbe used to prevent traffic analysis in overall network byachieving the same goal in each network segmentindependently. On each network segment,complementary traffic is generated according to its realtraffic, and the combination of these two kinds of trafficconstitutes the normalized traffic on each link. Mainadvantages of our approach are, from the performanceviewpoint, 1) complementary traffic does not competeon the bandwidth with real traffic actively, and 2)complementary traffic does not consume the bandwidthof other network segment at all. In addition, byencrypting source and destination IP addresses of eachpacket, anonymous communication can be achieved andanonymous normalized traffic loses its value for theanalysis of eavesdropped traffic by intruders.