MILCOM 2008 - 2008 IEEE Military Communications Conference 2008
DOI: 10.1109/milcom.2008.4753212
|View full text |Cite
|
Sign up to set email alerts
|

Applying network address encryption to anonymity and preventing data exfiltration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
“…Trostle [88] focuses on preventing data exfiltration from a network. The author takes the example of a malicious process with access to data it wishes to transmit out of a network, which it might attempt via a timing channel, sending packets on a vector where its external collaborator can monitor traffic.…”
Section: Cyber Deceptionmentioning
confidence: 99%
“…Jonathan [9] proposed a one-time encrypted Network addresses by considering the two existing security problems are anonymous communications and prevention of ex-filtration of data through network covert channels. It was shown clearly how one-time encrypted addresses can prevent attacks of traffic analysis and intersection that can avoid or prevent low-latency and anonymous communication.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There have been attempts to enhance the anti-scanning feature of the IP addresses, mainly by: 1) generating addresses that is semantically opaque and more random [22], 2) using temporal [23,24] or hopping [25][26][27][28][29][30] addresses with short lifetime, and further 3) using a unique address for each connection [31][32][33][34][35] or even packet [36,37].…”
Section: Introductionmentioning
confidence: 99%
“…Previous work [35][36][37] propose to encrypt host identity into pseudo-random temporal addresses, so that the host identity is hidden from the outside network. But it has to be done on local routers, otherwise routing will fail.…”
Section: Introductionmentioning
confidence: 99%