NetCamo: Camouflaging Network Traffic for Real-Time Applications
نویسندگان
چکیده
The first objective of NetCamo is to provide security services beyond the traditional encryption techniques that have played an important role in network security. It is a misconception that to secure a network, one only needs to encrypt the traffic. With increasing amounts of traffic being encrypted and its contents, therefore, being beyond the reach of effective cryptanalysis, attention is shifting toward traffic analysis, and the prevention thereof.
منابع مشابه
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications
This paper presents the general approach, design, implementation, and evaluation of NetCamo, which is a system to prevent traffic analysis in systems with real-time requirements. Integrated support for both security and real-time is becoming necessary for computer networks that support mission critical applications. This study focuses on how to integrate both the prevention of traffic analysis ...
متن کاملUsing Parasite Flows to Camouflage Flow Traffic
This paper presents a flow based architecture for network traffic camouflaging. We aim at hiding both the message traffic pattern and the fact that camouflaging itself is taking place, while at the same time guaranteeing the QoS requirement of the message flow. The idea is to embed the packets of the message flow into the packets of another flow, denoted as carrier flow, which in turn may be ge...
متن کاملFeature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کاملPURDUE UNIVERSITY TECHNICAL REPORT Camouflaging Timing Channels in Web Traffic
Web traffic accounts for more than half of Internet traffic today. Camouflaging covert timing channels in Web traffic would be advantageous for concealment. In this paper, we investigate the possibility of disguising network covert timing channels as HTTP traffic to avoid detection. Extensive research has shown that Internet traffic, including HTTP traffic, exhibits self-similarity and long ran...
متن کاملEfficient Network Camouflaging in Wireless Networks
Efficient Network Camouflaging in Wireless Networks. (December 2005) Shu Jiang, B.E., University of Science and Technology, China; M.E., Nanjing University, China Co–Chairs of Advisory Committee: Dr. Nitin H. Vaidya Dr. Wei Zhao Camouflaging is about making something invisible or less visible. Network camouflaging is about hiding certain traffic information (e.g. traffic pattern, traffic flow i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001