作者: Alfonso Iacovazzi , Andrea Baiocchi
DOI: 10.1109/ICCW.2013.6649446
关键词: Traffic shaping 、 Internet traffic engineering 、 Network packet 、 Traffic generation model 、 Computer science 、 Traffic policing 、 Information leakage 、 Traffic analysis 、 Computer network 、 Information privacy
摘要: It has been demonstrated that traffic analysis can disclose information supposedly secured by encrypted channels. Key feature of packetized exploited to purpose are packet lengths, inter-packet times, direction packets. This work aims at assessing the overhead and delay implied masking algorithms conceal leakage statistical analysis. Traffic is obtained reshaping lengths inter-arrival times in a device. shown overhead-delay trade-off device optimized using circuit like shaping, under constraint removing entirely (full privacy). Numerical examples provided with real traces both for full privacy relaxed heuristic algorithm leaks some on mitigate overhead.