Towards provably invisible network flow fingerprints

@article{Soltani2017TowardsPI,
  title={Towards provably invisible network flow fingerprints},
  author={R. Soltani and D. Goeckel and D. Towsley and A. Houmansadr},
  journal={2017 51st Asilomar Conference on Signals, Systems, and Computers},
  year={2017},
  pages={258-262}
}
Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a watchful adversary Willie. Bob, who receives the set of fingerprinted flows after they pass through… Expand
10 Citations
Fundamental Limits of Invisible Flow Fingerprinting
  • 7
  • PDF
Fundamental Limits of Covert Bit Insertion in Packets
  • 3
  • PDF
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces
  • 7
  • PDF
Fundamental Limits of Covert Packet Insertion
  • 1
  • PDF
Matching Anonymized and Obfuscated Time Series to Users’ Profiles
  • 28
  • PDF
Privacy of Dependent Users Against Statistical Matching
  • 7
  • PDF
Asymptotic Limits of Privacy in Bayesian Time Series Matching
  • 3
  • PDF
Covert Wireless Communication With Artificial Noise Generation
  • 51
  • PDF
Consumer Life Cycle and Profiling: A Data Mining Perspective
  • PDF
INFORMATION-THEORETIC LIMITS ON STATISTICAL MATCHING WITH APPLICATIONS TO PRIVACY
  • Highly Influenced

References

SHOWING 1-10 OF 21 REFERENCES
The Need for Flow Fingerprints to Link Correlated Network Flows
  • 34
  • PDF
TagIt: Tagging Network Flows using Blind Fingerprints
  • 7
SWIRL: A Scalable Watermark to Detect Correlated Network Flows
  • 94
  • PDF
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
  • 120
  • PDF
Tracking anonymous peer-to-peer VoIP calls on the internet
  • 258
  • PDF
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
  • 256
  • PDF
Covert communications on renewal packet channels
  • 15
  • PDF
Covert communications on Poisson packet channels
  • 18
  • PDF
Covert single-hop communication in a wireless network with distributed artificial noise generation
  • 35
  • PDF
Detecting Stepping Stones
  • Yin Zhang, V. Paxson
  • Computer Science
  • USENIX Security Symposium
  • 2000
  • 431
  • PDF
...
1
2
3
...