Investigating the trade-off between overhead and delay for full packet traffic privacy

作者: Alfonso Iacovazzi , Andrea Baiocchi

DOI: 10.1109/ICCW.2013.6649446

关键词: Traffic shapingInternet traffic engineeringNetwork packetTraffic generation modelComputer scienceTraffic policingInformation leakageTraffic analysisComputer networkInformation privacy

摘要: It has been demonstrated that traffic analysis can disclose information supposedly secured by encrypted channels. Key feature of packetized exploited to purpose are packet lengths, inter-packet times, direction packets. This work aims at assessing the overhead and delay implied masking algorithms conceal leakage statistical analysis. Traffic is obtained reshaping lengths inter-arrival times in a device. shown overhead-delay trade-off device optimized using circuit like shaping, under constraint removing entirely (full privacy). Numerical examples provided with real traces both for full privacy relaxed heuristic algorithm leaks some on mitigate overhead.

参考文章(23)
Fabian Monrose, Charles V. Wright, Lucas Ballard, Gerald M. Masson, Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? usenix security symposium. pp. 4- ,(2007)
Shui Yu, Theerasak Thapngam, Su Wei, Wanlei Zhou, Efficient web browsing with perfect anonymity using page prefetching international conference on algorithms and architectures for parallel processing. pp. 1- 12 ,(2010) , 10.1007/978-3-642-13119-6_1
Adam Back, Ulf Möller, Anton Stiglic, Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems information hiding. pp. 245- 257 ,(2001) , 10.1007/3-540-45496-9_18
Fabian Monrose, Scott E. Coull, Charles V. Wright, Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. network and distributed system security symposium. ,(2009)
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor, An information-theoretic approach to privacy allerton conference on communication, control, and computing. pp. 1220- 1227 ,(2010) , 10.1109/ALLERTON.2010.5707053
Alfonso Iacovazzi, Andrea Baiocchi, Optimum packet length masking international teletraffic congress. pp. 1- 8 ,(2010) , 10.1109/ITC.2010.5608728
Yeon-sup Lim, Hyun-chul Kim, Jiwoong Jeong, Chong-kwon Kim, Ted "Taekyoung" Kwon, Yanghee Choi, Internet traffic classification demystified: on the sources of the discriminative power conference on emerging network experiment and technology. pp. 9- ,(2010) , 10.1145/1921168.1921180
Hyunchul Kim, KC Claffy, Marina Fomenkov, Dhiman Barman, Michalis Faloutsos, KiYoung Lee, Internet traffic classification demystified: myths, caveats, and the best practices conference on emerging network experiment and technology. pp. 11- ,(2008) , 10.1145/1544012.1544023
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton, Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail ieee symposium on security and privacy. pp. 332- 346 ,(2012) , 10.1109/SP.2012.28
J. Ghaderi, R. Srikant, Towards a Theory of Anonymous Networking international conference on computer communications. pp. 686- 694 ,(2010) , 10.1109/INFCOM.2010.5462155