Analytical and empirical analysis of countermeasures to traffic analysis attacks

被引:21
|
作者
Fu, XW [1 ]
Graham, B [1 ]
Bettati, R [1 ]
Zhao, W [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, College Stn, TX 77843 USA
关键词
D O I
10.1109/ICPP.2003.1240613
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper studies countermeasures. to traffic analysis attacks. A common strategy for such countermeasures is link padding. We consider systems where payload traffic is padded so that packets have either constant inter-arrival times or variable inter-arrival times. The adversary applies statistical recognition techniques to detect the payload traffic rates by using statistical measures like sample mean, sample variance, or sample entropy. We evaluate quantitatively the ability of the adversary to make a correct detection and derive closed-form formulas for the detection rate based on analytical models. Extensive experiments were carried out to validate the system performance predicted by the analytical method. Based on the systematic evaluations, we develop design guidelines for the proper configuration of a system in order to minimize the detection rate.
引用
收藏
页码:483 / 492
页数:10
相关论文
共 50 条
  • [31] Power Analysis Side Channel Attacks and Countermeasures for the Internet of Things
    Liptak, Christopher
    Mal-Sarkar, Sanchita
    Kumar, Sathish A. P.
    [J]. 2022 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS (PAINE), 2022, : 58 - 64
  • [32] To infect or not to infect: a critical analysis of infective countermeasures in fault attacks
    Baksi, Anubhab
    Saha, Dhiman
    Sarkar, Sumanta
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (04) : 355 - 374
  • [33] Analysis of countermeasures against access driven cache attacks on AES
    Bloemer, Johannes
    Krummel, Volker
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 96 - 109
  • [34] To infect or not to infect: a critical analysis of infective countermeasures in fault attacks
    Anubhab Baksi
    Dhiman Saha
    Sumanta Sarkar
    [J]. Journal of Cryptographic Engineering, 2020, 10 : 355 - 374
  • [35] Experiments on Two Clock Countermeasures Against Power Analysis Attacks
    Menicocci, Renato
    Trifiletti, Alessandro
    Trotta, Francesco
    [J]. 2014 PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS & SYSTEMS (MIXDES), 2014, : 215 - 219
  • [36] Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures
    Tanceska, Biljana
    Bogdanoski, Mitko
    Risteski, Aleksandar
    [J]. FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, 2015, 159 : 197 - 203
  • [37] Research on Circuit Level Countermeasures for Differential Power Analysis Attacks
    Wu, Di
    Cui, Xiaoxin
    Wei, Wei
    Li, Rui
    Yu, Dunshan
    Cui, Xiaole
    [J]. 2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT-2012), 2012, : 1446 - 1448
  • [38] A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks
    Feng, Jingyi
    Chen, Hua
    Li, Yang
    Jiao, Zhipeng
    Xi, Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 391 - 406
  • [39] Empirical Analysis and Countermeasures on Sustainable Development in Rural China
    Yang Tong
    [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 351 - 354
  • [40] Traffic analysis attacks on Skype VoIP calls
    Zhu, Ye
    Fub, Huirong
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (10) : 1202 - 1212