On Countermeasures to Traffic Analysis Attacks

نویسندگان

  • Xinwen Fu
  • Bryan Graham
  • Riccardo Bettati
  • Wei Zhao
چکیده

AbsfrucfThis paper makes three contributions. First, we propose Shannon’s perfect secrecy theory as a foundation for developing countermeasures to traffic analysis attacks on information security systems. A system violating the perfect secrecy conditions can leak mission critical information. Second, we suggest statistical pattern recognition as a fundamental technology to test an information system’s security. This technology can cover a large category of testing approaches because of statistical pattern recognition’s maturity and abundant techniques. Third, researchers have proposed traffic padding as countermeasures to traffic analysis attacks. By applying the proposed information assurance testing framework, we find that constant rate traffic padding does not satisfy Shannon’s perfect secrecy conditions because of its implementation mechanism. We design a variant rate traffic padding strategy as an alternative, which is validated by both theoretical analysis and empirical results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks

Traffic analysis attacks aim at deriving mission critical information from the analysis of the traffic transmitted over a network. Countermeasures for such attacks are usually realized by properly “padding” the payload traffic so that the statistics of the overall traffic become significantly different from that of the payload traffic. In this paper, we propose a analytical framework for traffi...

متن کامل

Active Traffic Analysis Attacks and Countermeasures

To explore mission-critical information, an adversary using active traffic analysis attacks injects probing traffic into the victim network and analyzes the status of underlying payload traffic. Active traffic analysis attacks are easy to deploy and hence become a serious threat to mission critical applications. This paper suggests statistical pattern recognition as a fundamental technology to ...

متن کامل

ON TRAFFIC ANALYSIS ATTACKS AND COUNTERMEASURES A Dissertation by

On Traffic Analysis Attacks and Countermeasures. (December 2005) Xinwen Fu, B.S., Xi’an Jiaotong University; M.S., University of Science and Technology of China Co-Chairs of Advisory Committee: Dr. Wei Zhao Dr. Riccardo Bettati Security and privacy have gained more and more attention with the rapid growth and public acceptance of the Internet as a means of communication and information dissemin...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

On Flow Correlation Attacks and Countermeasures in Mix Networks

In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures that can defeat various traffic analysis attacks. In this paper, we focus on a particular class of traffic analysis attack, flow correlation attacks, by which an advers...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003