NetCamo: Camouflaging Network Traffic for Real-Time Applications

نویسندگان

  • X. Fu
  • B. Graham
  • R. Bettati
چکیده

The first objective of NetCamo is to provide security services beyond the traditional encryption techniques that have played an important role in network security. It is a misconception that to secure a network, one only needs to encrypt the traffic. With increasing amounts of traffic being encrypted and its contents, therefore, being beyond the reach of effective cryptanalysis, attention is shifting toward traffic analysis, and the prevention thereof.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications

This paper presents the general approach, design, implementation, and evaluation of NetCamo, which is a system to prevent traffic analysis in systems with real-time requirements. Integrated support for both security and real-time is becoming necessary for computer networks that support mission critical applications. This study focuses on how to integrate both the prevention of traffic analysis ...

متن کامل

Using Parasite Flows to Camouflage Flow Traffic

This paper presents a flow based architecture for network traffic camouflaging. We aim at hiding both the message traffic pattern and the fact that camouflaging itself is taking place, while at the same time guaranteeing the QoS requirement of the message flow. The idea is to embed the packets of the message flow into the packets of another flow, denoted as carrier flow, which in turn may be ge...

متن کامل

Feature Extraction to Identify Network Traffic with Considering Packet Loss Effects

There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...

متن کامل

PURDUE UNIVERSITY TECHNICAL REPORT Camouflaging Timing Channels in Web Traffic

Web traffic accounts for more than half of Internet traffic today. Camouflaging covert timing channels in Web traffic would be advantageous for concealment. In this paper, we investigate the possibility of disguising network covert timing channels as HTTP traffic to avoid detection. Extensive research has shown that Internet traffic, including HTTP traffic, exhibits self-similarity and long ran...

متن کامل

Efficient Network Camouflaging in Wireless Networks

Efficient Network Camouflaging in Wireless Networks. (December 2005) Shu Jiang, B.E., University of Science and Technology, China; M.E., Nanjing University, China Co–Chairs of Advisory Committee: Dr. Nitin H. Vaidya Dr. Wei Zhao Camouflaging is about making something invisible or less visible. Network camouflaging is about hiding certain traffic information (e.g. traffic pattern, traffic flow i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001