登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
网络流水印技术研究进展
  • 摘要

    网络流水印技术作为一种主动流量分析手段,可有效追踪恶意匿名通信使用者与跳板链后的真实攻击者,具有准确率高、误报率低和观测时间短等优点,在攻击源追踪、网络监管和攻击取证等领域有着重要应用.首先阐述网络流水印技术的基本框架及主要特点,接着对当前基于包栽荷、基于流速率和基于包时间的典型网络流水印技术进行简要介绍,然后概述针对网络流水印技术的时间分析攻击、多流攻击和均方自相关攻击等主要攻击手段与反制对策,最后对网络流水印技术的发展前景进行展望.

  • 作者

    张连成  王振兴  刘慧生  ZHANG Lian-cheng  WANG Zhen-xing  LIU Hui-sheng 

  • 作者单位

    解放军信息工程大学信息工程学院 郑州450002

  • 刊期

    2011年11期 ISTIC PKU

  • 关键词

    网络流水印  包时间  时间间隔  扩频通信  多流攻击  均方自相关攻击  匿名通信  跳板 

参考文献
  • [1] 邵立松,窦文华. 自相似网络通信量模型研究综述. 电子与信息学报, 2005,10
  • [2] Abry P.;Veitch D.. Wavelet analysis of long-range-dependent traffic. IEEE Transactions on Information Theory, 1998,1
  • [3] Michael K. Reiter;Aviel D. Rubin. Anonymous Web Transactions with Crowds. Communications of the ACM, 1999,2
  • [4] 傅翀,钱伟中,赵明渊,秦志光. 匿名通信系统时间攻击的时延规范化防御方法. 东南大学学报(自然科学版), 2009,4
  • [5] Dingledine R;Mathewson N;Syverson P. Tor:the second-generation onion router. San Diego.CA,USA:USENIX Association, 2004
  • [6] Zhu Ye;Fu Xin-wen;Gramham B. Correlation-based traffic analysis attacks on anonymity networks. IEEE Transactions on Parallel and Distributed Systems, 2010,07
  • [7] Houmansadr A;Coleman T;Kiyavash N. On the channel capacity of network flow watermarking. Chicago,IL,USA:ACM Press, 2009
  • [8] Houmansadr A;Kiyavash N;Borisov N. Rainbow:a robust and invisible non-blind watermark for network flows. San Diego,CA,USA:The Internet Society, 2009
  • [9] Wang Xin-yuan;Chen Shi-ping;Jajodia S. Network flow watermarking attack on low-latency anonymous communication systems. Oakland,California,USA:IEEE Computer Society, 2007
  • [10] Wang Xin-yuan;Reeves D S;Wu S F. Sleepy watermark tracing:an active network-based intrusion response framework. Paris,France:Kluwer Academic Publishers, 2001
  • [11] Ramsbrock D;Wang Xin-yuan;Jiang Xu-xian. A first step toward live botmaster traceback. Boston,MA,USA:Springer, 2008
  • [12] Fu Xin-wen;Zhu Ye;Graham B. On flow marking attacks in wireless anonymous communication networks. Columbus,OH:IEEE Computer Society, 2005
  • [13] Yu Wei;Fu Xin-wen;Graham S. Dsss-based flow marking technique for invisible traceback. Oakland,CA,USA:IEEE Computer Society, 2007
  • [14] Park Y H;Reeves D S. Adaptive timing-hased active watermarking for attack attribution through stepping stones. Washington,DC,USA:IEEE Computer Society, 2007
  • [15] Zhang Lian-cheng;Wang Zhen-xing;Wang Qing-long. Msac and multi-flow attacks resistant spread spectrum watermarks for network flows. Chongqing,China:IEEE, 2010
  • [16] Paxson V;Floyd S. Wide-area traffic:the failure of poisson modeling. IEEE/ACM Transactions on Networking, 1995,03
  • [17] Zhang Lu;Luo Jun-zhou;Yang Miug. An improved dsss-based flow marking technique for anonymous communication traeeback. Brisbane,Australia:IEEE Computer Society, 2009
  • [18] Zhang Yin;Paxson V. Detecting stepping stones. Denver,Colorado:USENIX Association, 2000
  • [19] Staniford-Chen S;Heberlein L T. Holding intruders accountable on the internet. Oakland,CA,USA:IEEE, 1995
  • [20] Wang Xin-yuan;Reeves D S;Wu S F. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. Zurich,Switzerland:Springer-Verlag, 2002
  • [21] Wang Xin-yuan;Reeves D S. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. Washington,DC,USA:ACM, 2003
  • [22] HE Ting;TONG Lang. Detecting encrypted stepping-stone connections. IEEE Transactions on Signal Processing, 2007,05
  • [23] Jia Wei-jia;Tso F P;Ling Zhen. Blind detection of spread spectrum flow watermarks. Rio de Janeiro,Brazil:IEEE Computer Society, 2009
  • [24] Luo Xia-pu;Zhang Jun-jie;Perdisci R. On the secrecy of spread-spectrum flow watermarks. Athena,Greece:Springer, 2010
  • [25] Houmansadr A;Kiyavash N;Borisov N. Multi-flow attack resistant watermarks for network flows. Taipei,Taiwan:IEEE, 2009
  • [26] Wang Xiao-gaug;Luo Jun-zhou;Yang Ming. An interval centroid based spread spectrum watermark for tracing multiple network flows. San Antonio,TX,USA:IEEE, 2009
  • [27] Kiyavash N;Houmansadr A;Borisov N. Multi-flow attacks against network flow watermarking schemes. San Jose,CA,USA:USENIX Association, 2008
  • [28] Huang Di-jiang;Agarwal U. Countering repacketization watermarking attacks on tor network. Beijing,China:Springer, 2010
  • [29] Pyun Y J;Park Y H;Wang Xin-yuan. Tracing traffic through intermediate hosts that repacketize flows. Anchorage,AK,USA:IEEE, 2007
  • [30] Peng Pai;Ning Peng;Reeves D S. On the secrecy of timing-based active watermarking trace-back techniques. Berkeley,California,USA:IEEE Computer Society, 2006
  • [31] Wang Xiao-gang;Luo Jun-zhou;Yang Ming. A double interval centroid-based watermark for network flow traeeback. 上海:IEEE, 2010
  • [32] Peng Pai;Ning Peug;Reeves D S. Active timing-based correlation of perturbed traffic flows with chaff packets. Columbus,OH,USA:IEEE Computer Society, 2005
  • [33] Wang Xin-yuan;Chen Shi-ping;Jajodia S. Tracking anonymous peer-to-peer voip calls on the internet. Alexandra,Virginia,USA:ACM, 2005
  • [34] Reiter M K;Rubin A D. Crowds:anonymity for web transactions. ACM Transactions on Information and System Security, 1998,01
  • [35] Pan Zheng;Peng Hong;Long Xian-zhong. A watermarking-based host correlation detection scheme. Nanchaug,China:IEEE Computer Society, 2009
查看更多︾
相似文献 查看更多>>
107.20.10.203