Proceedings of the 1999 Workshop on New Security Paradigms 1999
DOI: 10.1145/335169.335184
|View full text |Cite
|
Sign up to set email alerts
|

Secure dynamic adaptive traffic masking

Abstract: As public internetworks are increasingly used for secure communications, the need grows for end-to-end protection fi'om traffic analysis. The additional protection of Traffic Flow Confidentiality can be detrimental to performance when padding is used to mask traffic patterns. Traffic masking policies that are responsive to system service requirements can improve performance, but secure adaptive traffic masking has to balance performance requirements with system protection requirements. This paper addresses the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2001
2001
2010
2010

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Timmerman [29,30] proposed an adaptive "traffic masking" technique for latency-insensitive applications such as email. Her S-DATM algorithm uses cover traffic and artificial delays to ensure that traffic emerging from each user conforms to a certain profile.…”
Section: Related Workmentioning
confidence: 99%
“…Timmerman [29,30] proposed an adaptive "traffic masking" technique for latency-insensitive applications such as email. Her S-DATM algorithm uses cover traffic and artificial delays to ensure that traffic emerging from each user conforms to a certain profile.…”
Section: Related Workmentioning
confidence: 99%
“…A robust anonymous communication system should be able to safeguard traffic analysis. The research in this area includes traffic flow confidentiality [103][104][105] and traffic flow analysis [106][107][108][109].…”
Section: Other Systemsmentioning
confidence: 99%
“…An anonymizing protocol depends upon a mix of traffic to disguise the source and destination of any particular item. Statistical studies, such as the work of Timmerman [82] or Wright et al [85], will be of use here to determine how well this strategy works in different situations. Previous work done on the analysis of covert channels in networks [84] might also be of use here, if applied properly.…”
Section: B New Applications and Threatsmentioning
confidence: 99%