作者: Santosh Lomte , Snehshree Dengle , Saptshree Dengle
DOI:
关键词:
摘要: Network security is complex and challenging problem in today's world. Despite of many sophisticated techniques, attack on the network continues to increase. At present, order hide identity attacker, attackers send their through a chain compromised hosts that are used as "stepping stones". In this paper we present an approach find connection intruder for tracing back origin especially if traffic encrypted one. Our will based analyzing correlations between number packets sent outgoing connections incoming connection. We proposed correlation scheme watermarking which be robust against timing perturbation. This yields effective better results terms than existing passive correlation. presents new method embedding watermark flow. Here purpose watermark, packet adjusted specific intervals. By slightly changing timing, achieve random