A Novel Invisible and Private Flow Watermarking Scheme
Received date: 2011-02-15
Revised date: 2011-10-13
Online published: 2012-09-25
Existing active flow watermarking techniques introduce significant delays to target flows, enabling attackers to detect and remove the inserted watermark from the flow, and even duplicate them to unmarked flows. We propose a novel invisible and private flow watermarking scheme that embeds watermarks in randomly chosen inter-packet delay positions. Different pseudo-noise codes are used across multiple network flows
by slightly manipulating the arrival times of the packets. Theoretical analysis and experimental results demonstrate that the proposed scheme is robust against timing perturbation, effective in detecting multiple network flows, and invisible to timing analysis attack based on the Kolmogrov-Smirnov test.
ZHANG Lian-cheng, WANG Zhen-xing, XU Jing . A Novel Invisible and Private Flow Watermarking Scheme[J]. Journal of Applied Sciences, 2012 , 30(5) : 524 -530 . DOI: 10.3969/j.issn.0255-8297.2012.05.014
[1] Zhang Yin, Paxson V. Detecting stepping stones[C]//Proceedings of the 9th USENIX Security Symposium,Denver, Colorado, 2000: 171-184.
[2] Donoho D L, Flesia A G, Shankar U, Paxson V, Coit J, Stanford S. Multiscale steppingstone detection: detecting pairs of jittered interactive
streams by exploiting maximum tolerable delay[C]//Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection,
Zurich, Switzerland, 2002: 17-35.
[3] Blum A, Song D, Venkataraman S. Detection of interactive stepping stones: algorithms and confidence bounds [C]//Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection, Sophia Antipolis, France, 2004: 258-277.
[4] Wang Xinyuan, Reeves D S, Wu S F. Inter-packet delay based correlation for tracing encrypted connections through stepping stones [C]//Proceedings of the 7th European Symposium on Research in Computer Security, Zurich, Switzerland, 2002: 244-263.
[5] Peng Pai, Ning Peng, Reeves D S, Wang Xinyuan. Active timing-based correlation of perturbed traffic flows with chaff packets
[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops, Columbus, OH, USA, 2005: 107-113.
[6] He Ting, Tong Lang. Detecting encrypted steppingstone connections [J]. IEEE Transactions on Signal Processing, 2007, 55(4): 1612-1623.
[7] Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms [J]. Communication of the ACM, 1981, 24(1): 84-88.
[8] Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router [C]//Proceedings of the 13th USENIX Security Symposium, San
Diego, CA, USA, 2004: 303-320.
[9] Reiter M K, Rubin A D. Anonymous web transactions with crowds [J]. Communications of the ACM, 1999, 42(2): 32-38.
[10] Freedman M J, Morris R. Tarzan: a peer-to-peer anonymizing network layer [C]//Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2002: 303- 320.
[11] Yoda K, Etoh H. Finding a connection chain for tracing intruders [C]//Proceedings of the 6th European Symposium on Research in Computer Security, Toulouse, France, 2000: 191-205.
[12] Wang Xinyuan, Reeves D S. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays [C]//Proceedingsof the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003:20-29.
[13] Pyun Y J, Park Y H, Wang Xinyuan, Reeves D S, Ning Peng. Tracing traffic through intermediate hosts that repacketize flows [C]//Proceedings
of the 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007:634-642.
[14] Wang Xinyuan, Chen Shiping, Jajodia S. Network flow watermarking attack on low-latency anonymous communication systems [C]//Proceedings of 2007 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2007: 116-130.
[15] Yu Wei, Fu Xinwen, Graham S, Xuan Dong, Zhao Wei. DSSS-based flow marking technique for invisible traceback [C]//Proceedings of 2007 IEEE
Symposium on Security and Privacy, Oakland, CA, USA, 2007: 7-21.
[16] Kiyavash N, Houmansadr A, Borisov N. Multiflow attacks against network flow watermarking schemes [C]//Proceedings of 17th USENIX Security,
San Jose, CA, USA, 2008: 307-320.
[17] Jia Weijia, Tso F P, Ling Zhen, Fu Xinwen, Xuan Dong, Yu Wei. Blind detection of spread spectrum flow watermarks [C]//Proceedings of the
28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, 2009: 2195-2203.
[18] Peng Pai, Ning Peng, Reeves D S. On the secrecy of timing-based active watermarking trace-back techniques [C]//Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2006: 334-349.
[19] Houmansadr A, Kiyavash N, Borisov N. RAINBOW: a robust and invisible non-blind watermark for network flows [C]//Proceedings of the 16th Annual Network & Distributed System Security Symposium,San Diego, CA, USA, 2009: 224-236.
/
| 〈 |
|
〉 |