Padding and fragmentation for masking packet length statistics

作者: Alfonso Iacovazzi , Andrea Baiocchi

DOI: 10.1007/978-3-642-28534-9_9

关键词: Computer scienceFragmentation (computing)Optimization problemApplication protocolIP fragmentationReal-time computingMasking (Electronic Health Record)AlgorithmNetwork packetPaddingEfficient algorithm

摘要: We aim at understanding if and how complex it is to obfuscate traffic features exploited by statistical flow classification tools. address packet length masking define perfect as an optimization problem, aiming minimizing overhead. An explicit efficient algorithm given compute the optimum sequence. Numerical results are provided, based on measured traces. find that fragmenting requires about same overhead padding does.

参考文章(10)
Qi Shi, Ning Zhang, Journal of Information Assurance and Security information assurance and security. ,(2009)
Shui Yu, Theerasak Thapngam, Su Wei, Wanlei Zhou, Efficient web browsing with perfect anonymity using page prefetching international conference on algorithms and architectures for parallel processing. pp. 1- 12 ,(2010) , 10.1007/978-3-642-13119-6_1
Fabian Monrose, Scott E. Coull, Charles V. Wright, Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. network and distributed system security symposium. ,(2009)
Alice Este, Francesco Gringoli, Luca Salgarelli, On the stability of the information carried by traffic flow features at the packet level ACM SIGCOMM Computer Communication Review. ,vol. 39, pp. 13- 18 ,(2009) , 10.1145/1568613.1568616
Yeon-sup Lim, Hyun-chul Kim, Jiwoong Jeong, Chong-kwon Kim, Ted "Taekyoung" Kwon, Yanghee Choi, Internet traffic classification demystified: on the sources of the discriminative power conference on emerging network experiment and technology. pp. 9- ,(2010) , 10.1145/1921168.1921180
Hyunchul Kim, KC Claffy, Marina Fomenkov, Dhiman Barman, Michalis Faloutsos, KiYoung Lee, Internet traffic classification demystified: myths, caveats, and the best practices conference on emerging network experiment and technology. pp. 11- ,(2008) , 10.1145/1544012.1544023
Andrew M. White, Austin R. Matthews, Kevin Z. Snow, Fabian Monrose, Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks ieee symposium on security and privacy. pp. 3- 18 ,(2011) , 10.1109/SP.2011.34
Arthur Callado, Carlos Kamienski, Geza Szabo, Balazs Peter Gero, Judith Kelner, Stenio Fernandes, Djamel Sadok, A Survey on Internet Traffic Identification IEEE Communications Surveys and Tutorials. ,vol. 11, pp. 37- 52 ,(2009) , 10.1109/SURV.2009.090304
H. W. Kuhn, The Hungarian method for the assignment problem Naval Research Logistics Quarterly. ,vol. 2, pp. 83- 97 ,(1955) , 10.1002/NAV.3800020109
Frank L. Hitchcock, The Distribution of a Product from Several Sources to Numerous Localities Journal of Mathematics and Physics. ,vol. 20, pp. 224- 230 ,(1941) , 10.1002/SAPM1941201224