Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.

作者: Fabian Monrose , Scott E. Coull , Charles V. Wright

DOI:

关键词:

摘要: Recent work has shown that properties of network traffic remain observable after encryption, namely packet sizes and timing, can reveal surprising information about the traffic’s contents (e.g., language a VoIP call [29], passwords in secure shell logins [20], or even web browsing habits [21, 14]). While there are some legitimate uses for encrypted analysis, these techniques also raise important questions privacy communications. A common tactic mitigating such threats is to pad packets uniform send at fixed timing intervals; however, this approach often inefficient. In paper, we propose novel method thwarting statistical analysis algorithms by optimally morphing one class look like another class. Through use convex optimization techniques, show how modify real-time reduce accuracy variety classifiers while incurring much less overhead than padding. Our evaluation technique against two published [29] [14] shows works well on wide range data—in cases, simultaneously providing better lower naive

参考文章(29)
Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion, Undermining an anomaly-based intrusion detection system using common exploits recent advances in intrusion detection. pp. 54- 73 ,(2002) , 10.1007/3-540-36084-0_4
Mike Noel, Terri Lander, Ronald A. Cole, Beatrice T. Oshika, The OGI 22 language telephone speech corpus. conference of the international speech communication association. ,(1995)
Fabian Monrose, Charles V. Wright, Lucas Ballard, Gerald M. Masson, Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? usenix security symposium. pp. 4- ,(2007)
F. Monrose, S. E. Coull, M. P. Collins, C. V. Wright, M. K. Reiter, On web browsing privacy in anonymized NetFlows usenix security symposium. pp. 23- ,(2007)
Baugher, The Secure Real-Time Transport Protocol draft-ietf-avt-srtp-09.txt. ,(2003)
James Newsome, Brad Karp, Dawn Song, Paragraph: Thwarting Signature Learning by Training Maliciously Lecture Notes in Computer Science. pp. 81- 105 ,(2006) , 10.1007/11856214_5
Simon P Chung, Aloysius K Mok, None, Advanced allergy attacks: does a corpus really help recent advances in intrusion detection. pp. 236- 255 ,(2007) , 10.1007/978-3-540-74320-0_13
Dawn Song, Avrim Blum, Shobha Venkataraman, Limits of Learning-based Signature Generation with Adversaries. network and distributed system security symposium. ,(2008)
D. Koukis, S. Antonatos, K. G. Anagnostakis, On the privacy risks of publishing anonymized IP network traces international conference on communications. pp. 22- 32 ,(2006) , 10.1007/11909033_3