Skip to main content
Top

2018 | OriginalPaper | Chapter

A Comprehensive Analysis of Interval Based Network Flow Watermarking

Authors : Jin Shi, Li Zhang, Shuijun Yin, Weiwei Liu, Jiangtao Zhai, Guangjie Liu, Yuewei Dai

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As the main active traffic analysis method, network flow watermarking (NFW) has been proven effective for flow correlation in anonymous communication system or stepping stone detection. In various types of network flow watermarking schemes, the interval-based ones can achieve significant better capability of resisting network interference. However, there still exists no work to give a comprehensive analysis of them, specifically on practicability as the implementation of NFW in Internet still remains a great challenge. In this paper, the existing interval-based NFW schemes are comparatively analyzed by benchmarking their performance on robustness, invisibility and practicability. Different from some prior work, we pay special attention to the practicability evaluation, which is related to time and storage overhead, communication and computation overhead, and the statistical model demand. Experimental results on CAIDA dataset give an overview of the existing interval-based NFW schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: the second-generation onion router. Proc. Usenix Secur. Symp. 40(3), 191–212(2004) Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: the second-generation onion router. Proc. Usenix Secur. Symp. 40(3), 191–212(2004)
3.
go back to reference Boyan, J,F.: The anonymizer: protecting user privacy on the web. Comput. Mediat. Commun. Mag. 4(9), 7–13 (1997) Boyan, J,F.: The anonymizer: protecting user privacy on the web. Comput. Mediat. Commun. Mag. 4(9), 7–13 (1997)
4.
go back to reference Wang, X., Reeves, D.F.: The traceback problem. In: Traceback and Anonymity, pp. 5–13 (2015) Wang, X., Reeves, D.F.: The traceback problem. In: Traceback and Anonymity, pp. 5–13 (2015)
5.
go back to reference Lu, T., Guo, R., Zhao, L., et al.: A systematic review of network flow watermarking in anonymity systems. Int. J. Secur. Appl. 10(3), 129–138(2016) Lu, T., Guo, R., Zhao, L., et al.: A systematic review of network flow watermarking in anonymity systems. Int. J. Secur. Appl. 10(3), 129–138(2016)
6.
go back to reference Birth, O.C.: Correlated network flows detection. In: Network Architectures and Services, pp. 93–99 (2011) Birth, O.C.: Correlated network flows detection. In: Network Architectures and Services, pp. 93–99 (2011)
9.
go back to reference Lv, J., Zhang, T., Li, Z., et al.: Pacom: parasitic anonymous communication in the bittorrent network. Comput. Netw. 74, 13–33 (2014)CrossRef Lv, J., Zhang, T., Li, Z., et al.: Pacom: parasitic anonymous communication in the bittorrent network. Comput. Netw. 74, 13–33 (2014)CrossRef
10.
go back to reference Yu, W., Fu, X., Graham, S., et al.: DSSS-based flow marking technique for invisible traceback. In: Security and Privacy, pp. 18–32(2007) Yu, W., Fu, X., Graham, S., et al.: DSSS-based flow marking technique for invisible traceback. In: Security and Privacy, pp. 18–32(2007)
11.
go back to reference Houmansadr, A., Kiyavash, N., Borisov, N.F.: Non-blind watermarking of network flows. IEEE Trans. Netw. 22(4), 1232–1244 (2014) Houmansadr, A., Kiyavash, N., Borisov, N.F.: Non-blind watermarking of network flows. IEEE Trans. Netw. 22(4), 1232–1244 (2014)
12.
go back to reference Wang, X., Reeves, D.F.: Robust correlation of encrypted attack traffic through stepping stones by flow watermarking. IEEE Trans. Dependable Secure Comput. 8(3), 434–449 (2011)CrossRef Wang, X., Reeves, D.F.: Robust correlation of encrypted attack traffic through stepping stones by flow watermarking. IEEE Trans. Dependable Secure Comput. 8(3), 434–449 (2011)CrossRef
13.
go back to reference Pyun, Y.J., Park, Y.H., Wang, X., et al.: Tracing traffic through intermediate hosts that repacketize flows. In: INFOCOM, pp. 634–642 (2007) Pyun, Y.J., Park, Y.H., Wang, X., et al.: Tracing traffic through intermediate hosts that repacketize flows. In: INFOCOM, pp. 634–642 (2007)
14.
go back to reference Houmansadr, A., Borisov, N.: F.: BotMosaic: collaborative network watermark for the detection of IRC-based botnets. J. Syst. Softw. 86(3), 707–715 (2013)CrossRef Houmansadr, A., Borisov, N.: F.: BotMosaic: collaborative network watermark for the detection of IRC-based botnets. J. Syst. Softw. 86(3), 707–715 (2013)CrossRef
15.
go back to reference Wang, X., Chen, S., Jajodia, S.C.: Network flow watermarking attack on low latency anonymous communication systems, pp. 116–130. IEEE Computer Society (2007) Wang, X., Chen, S., Jajodia, S.C.: Network flow watermarking attack on low latency anonymous communication systems, pp. 116–130. IEEE Computer Society (2007)
16.
go back to reference Wang, X., Luo, J., Yang, M.C.: A double interval centroid based watermark for network flow traceback. In: Computer Supported Cooperative Work, pp. 146–151 (2010) Wang, X., Luo, J., Yang, M.C.: A double interval centroid based watermark for network flow traceback. In: Computer Supported Cooperative Work, pp. 146–151 (2010)
17.
go back to reference Luo, J., Wang, X., Yang, M.F.: An interval centroid based spread spectrum watermarking scheme for multi-flow traceback. J. Netw. Comput. Appl. 35(1), 60–71 (2010)CrossRef Luo, J., Wang, X., Yang, M.F.: An interval centroid based spread spectrum watermarking scheme for multi-flow traceback. J. Netw. Comput. Appl. 35(1), 60–71 (2010)CrossRef
18.
go back to reference Houmansadr, A., Borisov, N.C.: SWIRL: a scalable watermark to detect correlated network flows. In: Network and Distributed System Security Symposium (2011) Houmansadr, A., Borisov, N.C.: SWIRL: a scalable watermark to detect correlated network flows. In: Network and Distributed System Security Symposium (2011)
19.
go back to reference Kiyavash, N., Houmansadr, A., Borisov, N.C.: Multi-flow attacks against network flow watermarking schemes. In: Usenix Security Symposium, pp. 307–320 (2008) Kiyavash, N., Houmansadr, A., Borisov, N.C.: Multi-flow attacks against network flow watermarking schemes. In: Usenix Security Symposium, pp. 307–320 (2008)
Metadata
Title
A Comprehensive Analysis of Interval Based Network Flow Watermarking
Authors
Jin Shi
Li Zhang
Shuijun Yin
Weiwei Liu
Jiangtao Zhai
Guangjie Liu
Yuewei Dai
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00015-8_7

Premium Partner