Defending against traffic analysis attacks with link padding for bursty traffics

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Preventing networks from being attacked has become a critical issue for network administrators and researchers. Even for systems where encryption is used they are still vulnerable to traffic analysis attacks. Attackers can launch catastrophic distributed denial of services attacks based on the critical link information derived from traffic analysis. Link padding can be used to defend against such traffic analysis attacks. In this paper, we propose a robust variant packet sending-interval link padding algorithm for bursty traffics. The histogram feature vector method is used to simulate the traffic analysis attack and principle component analysis is used to test the performance of the algorithm.

Original languageEnglish (US)
Title of host publicationProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
Pages46-51
Number of pages6
StatePublished - 2004
EventProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC - West Point, NY, United States
Duration: Jun 10 2004Jun 11 2004

Publication series

NameProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC

Other

OtherProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
Country/TerritoryUnited States
CityWest Point, NY
Period6/10/046/11/04

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Keywords

  • Anomaly detection
  • Heavy tail
  • Link padding
  • Principle components analysis

Fingerprint

Dive into the research topics of 'Defending against traffic analysis attacks with link padding for bursty traffics'. Together they form a unique fingerprint.

Cite this