Analytical and empirical analysis of countermeasures to traffic analysis attacks

被引:21
|
作者
Fu, XW [1 ]
Graham, B [1 ]
Bettati, R [1 ]
Zhao, W [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, College Stn, TX 77843 USA
关键词
D O I
10.1109/ICPP.2003.1240613
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper studies countermeasures. to traffic analysis attacks. A common strategy for such countermeasures is link padding. We consider systems where payload traffic is padded so that packets have either constant inter-arrival times or variable inter-arrival times. The adversary applies statistical recognition techniques to detect the payload traffic rates by using statistical measures like sample mean, sample variance, or sample entropy. We evaluate quantitatively the ability of the adversary to make a correct detection and derive closed-form formulas for the detection rate based on analytical models. Extensive experiments were carried out to validate the system performance predicted by the analytical method. Based on the systematic evaluations, we develop design guidelines for the proper configuration of a system in order to minimize the detection rate.
引用
收藏
页码:483 / 492
页数:10
相关论文
共 50 条
  • [1] On countermeasures to traffic analysis attacks
    Fu, XW
    Graham, B
    Bettati, R
    Zhao, W
    [J]. IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 188 - 195
  • [2] Active traffic analysis attacks and countermeasures
    Fu, XW
    Graham, B
    Bettati, R
    Zhao, W
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 31 - 39
  • [3] Countermeasures against traffic analysis attacks in wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 113 - 124
  • [4] Power analysis attacks and countermeasures
    Popp, Thomas
    Mangard, Stefan
    Oswald, Elisabeth
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 535 - 543
  • [5] Analysis of phishing attacks and countermeasures
    Issac, Biju
    Chiong, Raymond
    Jacob, Seibu Mary
    [J]. MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 339 - +
  • [6] Analysis of Cloud Computing Attacks and Countermeasures
    Jabir, Raja Mohamed
    Khanji, Salam Ismail Rasheed
    Ahmad, Liza Abdallah
    Alfandi, Omar
    Said, Huwida
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 117 - 123
  • [7] An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures
    AbdulGhaffar, AbdulAziz
    Paul, Sumit Kumar
    Matrawy, Ashraf
    [J]. 2023 BIENNIAL SYMPOSIUM ON COMMUNICATIONS, BSC, 2023, : 119 - 124
  • [8] Attacks and Countermeasures on 802.16: Analysis and Assessment
    Kolias, Constantinos
    Kambourakis, Georgios
    Gritzalis, Stefanos
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 487 - 514
  • [9] Analysis of Signature Wrapping Attacks and Countermeasures
    Gajek, Sebastian
    Jensen, Meiko
    Liao, Lijun
    Schwenk, Joerg
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, 2009, : 575 - 582
  • [10] Analytical Modelling and Traffic Control Analysis of Security Attacks for Cloud Computing
    Eneojo, Momoh
    Kirsal, Yonal
    Caglar, Ersin
    Paranthaunan, Vishnu Vardhan
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 453 - 457