2017 51st Asilomar Conference on Signals, Systems, and Computers 2017
DOI: 10.1109/acssc.2017.8335179
|View full text |Cite
|
Sign up to set email alerts
|

Towards provably invisible network flow fingerprints

Abstract: Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a watchful adversary Willie. Bob, who receives the set of fingerprinted flows after they pass through the network model… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
20
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

4
2

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…Similar to the definition of covertness [28]- [32], we define invisibility [1]: the probability of the failure event satisfies P f ≤ ζ as T → ∞. We term ζ the reliability parameter.…”
Section: B Definitionsmentioning
confidence: 99%
See 3 more Smart Citations
“…Similar to the definition of covertness [28]- [32], we define invisibility [1]: the probability of the failure event satisfies P f ≤ ζ as T → ∞. We term ζ the reliability parameter.…”
Section: B Definitionsmentioning
confidence: 99%
“…Construction: Per above, Alice uses a scheme consisting of two phases of lengths T 1 and T 2 , and employs a codebook of fingerprints to embed in the flows. The codebook construction is similar to the one adopted in [1], [29], [30]. In particular, Alice generates m independent instantiations of a Poisson process with parameter λT 2 , where T 2 is the length of the second phase, as follows.…”
Section: B Definitionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Similar to the definition of covertness in [1], [2], [16]- [18], [67], [68], and invisibility in [69], [70], we define covertness: We present results under the assumption that P(H 0 ) = P(H 1 ) = 1/2. However, this results in covertness for the general case [71, Appendix A].…”
Section: B Definitionsmentioning
confidence: 99%