A Novel Connection Correlation Scheme Based on Threshold Secret Sharing

被引:5
|
作者
Chen, Yonghong [1 ]
Zhang, Ning [1 ]
Tian, Hui [1 ]
Wang, Tian [1 ]
Cai, Yiqiao [1 ]
机构
[1] Natl Huaqiao Univ, Sch Comp Sci & Technol, Xiamen 361021, Peoples R China
基金
中国国家自然科学基金;
关键词
Flow correlation; network security; threshold secret sharing; robustness; NETWORK FLOW WATERMARKING; SYSTEMS; ENTROPY;
D O I
10.1109/LCOMM.2016.2604390
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Detecting correlated network flows aids with exposing the attackers who hide behind anonymous networks or stepping stones. More recent flow watermarking schemes can link flows, but are often impossible to achieve invisibility and robustness concurrently. This letter proposes an innovative connection correlation scheme capable of remaining invisible to attackers. The idea is that we exploit the burstiness and chaos inherent in network traffic to collect some unique and stable traffic traits, which are used later to construct an identifier based on Shamir's (t, n) threshold secret sharing scheme. Experimental results indicate that the proposed scheme is robust to network jitter, packet insertions, and losses.
引用
收藏
页码:2414 / 2417
页数:4
相关论文
共 50 条
  • [1] A novel threshold changeable secret sharing scheme
    Harn, Lein
    Hsu, Chingfang
    Xia, Zhe
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (01)
  • [2] A novel threshold changeable secret sharing scheme
    Lein Harn
    Chingfang Hsu
    Zhe Xia
    [J]. Frontiers of Computer Science, 2022, 16
  • [3] A novel threshold changeable secret sharing scheme
    HARN Lein
    HSU Chingfang
    XIA Zhe
    [J]. Frontiers of Computer Science, 2022, 16 (01)
  • [4] A novel weighted threshold secret image sharing scheme
    Li, Mingchu
    Ma, Shu
    Guo, Cheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3083 - 3093
  • [5] A Novel Hierarchical Threshold Secret Image Sharing Scheme
    Qin, Shiyue
    Tan, Zhenhua
    Li, Hong
    [J]. 2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 1163 - 1167
  • [6] A Novel Threshold Changeable Secret Image Sharing Scheme
    Wu, Guohua
    Wang, Mingyao
    Wang, Qiuhua
    Yao, Ye
    Yuan, Lifeng
    Miao, Gongxun
    [J]. SYMMETRY-BASEL, 2021, 13 (02): : 1 - 20
  • [7] A Lattice-Based Threshold Secret Sharing Scheme
    Khorasgani, Hamidreza Amini
    Asaad, Saba
    Eghlidos, Taraneh
    Aref, Mohammadreza
    [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 173 - 179
  • [8] Threshold Signature Scheme Based on Modular Secret Sharing
    Xie, Qi
    Shen, Zhonghua
    Yu, Xiuyuan
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +
  • [9] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    [J]. INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [10] CRT based threshold multi secret sharing scheme
    Subba Rao, Y.V.
    Bhagvati, Chakravarthy
    [J]. International Journal of Network Security, 2014, 16 (04) : 249 - 255