A Novel Connection Correlation Scheme Based on Threshold Secret Sharing

被引:5
|
作者
Chen, Yonghong [1 ]
Zhang, Ning [1 ]
Tian, Hui [1 ]
Wang, Tian [1 ]
Cai, Yiqiao [1 ]
机构
[1] Natl Huaqiao Univ, Sch Comp Sci & Technol, Xiamen 361021, Peoples R China
基金
中国国家自然科学基金;
关键词
Flow correlation; network security; threshold secret sharing; robustness; NETWORK FLOW WATERMARKING; SYSTEMS; ENTROPY;
D O I
10.1109/LCOMM.2016.2604390
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Detecting correlated network flows aids with exposing the attackers who hide behind anonymous networks or stepping stones. More recent flow watermarking schemes can link flows, but are often impossible to achieve invisibility and robustness concurrently. This letter proposes an innovative connection correlation scheme capable of remaining invisible to attackers. The idea is that we exploit the burstiness and chaos inherent in network traffic to collect some unique and stable traffic traits, which are used later to construct an identifier based on Shamir's (t, n) threshold secret sharing scheme. Experimental results indicate that the proposed scheme is robust to network jitter, packet insertions, and losses.
引用
收藏
页码:2414 / 2417
页数:4
相关论文
共 50 条
  • [31] Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme
    Sun, Qindong
    Cao, Han
    Li, Shancang
    Song, Houbing
    Liu, Yanxiao
    [J]. MATHEMATICS, 2022, 10 (05)
  • [32] Threshold Meaningful Secret Image Sharing Scheme Based on QR Code
    Hu, Fei
    Yao, Yuanzhi
    Li, Weihai
    Yu, Nenghai
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [33] Threshold changeable secret image sharing scheme based on interpolation polynomial
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Wu, Chi-Ming
    Sun, Qin-Dong
    Bi, Wei
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 18653 - 18667
  • [34] Threshold secret sharing scheme based on multidimensional sphere for cloud storage
    Tan Z.-H.
    Yang G.-M.
    Wang X.-W.
    Cheng W.
    Ning J.-Y.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2016, 27 (11): : 2912 - 2928
  • [35] A secret sharing scheme based on (t, n) threshold and adversary structure
    Qin, Huawang
    Dai, Yuewei
    Wang, Zhiquan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (05) : 379 - 385
  • [36] A secret sharing scheme based on (t, n) threshold and adversary structure
    Huawang Qin
    Yuewei Dai
    Zhiquan Wang
    [J]. International Journal of Information Security, 2009, 8
  • [37] On the Design and Security of a Lattice-Based Threshold Secret Sharing Scheme
    Khorasgani, Hamidreza Amini
    Asaad, Saba
    Pilaram, Hossein
    Eghlidos, Taraneh
    Aref, Mohammad Reza
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 25 - 38
  • [38] A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain
    Xing, Fengyue
    Yan, Xuehu
    Yu, Long
    Li, Longlong
    [J]. ENTROPY, 2022, 24 (03)
  • [39] A novel perceptual secret sharing scheme
    Yan, Xuehu
    Wang, Shen
    El-Latif, Ahmed A. Abd
    Sang, Jianzhi
    Niu, Xiamu
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 68 - 90
  • [40] Novel and effective secret sharing scheme
    Shi, Run-Hua
    Huang, Liu-Sheng
    Yang, Wei
    Zhong, Hong
    [J]. Tongxin Xuebao/Journal on Communications, 2012, 33 (01): : 10 - 16