Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

In this paper, we analyze several recent schemes for watermarking network flows that are based on splitting the flow into timing intervals. We show that this approach creates time-dependent correlations that enable an attack that combines multiple watermarked flows. Such an attack can easily be mounted in nearly all applications of network flow watermarking, both in anonymous communication and stepping stone detection. The attack can be used to detect the presence of a watermark, recover the secret parameters, and remove the watermark from a flow. The attack can be effective even if different flows are marked with different values of a watermark. We analyze the efficacy of our attack using a probabilistic model and a Markov-Modulated Poisson Process (MMPP) model of interactive traffic. We also implement our attack and test it using both synthetic and real-world traces, showing that our attack is effective with as few as 10 watermarked flows. Finally, we propose possible countermeasures to defeat the multi-flow attack.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-393448

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.