earticle

논문검색

A Systematic Review of Network Flow Watermarking In Anonymity Systems

초록

영어

With the rapid development of internet technology, the connection between man and internet is closer and closer. When people is communicating with others through internet, some malicious intruders may want to eavesdrop or peep the communicators. In order to evade being watching, people use anonymous communication systems to communicate. The anonymity system can encrypt the content of communication and the identity of the communicators. But if the communicators want to know who is talking to them at the other end, they must correlate the outgoing and incoming flows to identify a host or a person. As an active traffic analysis approach, network flow watermarking technology can detect the correlation of flows, and then make the anonymous communicators accountable. While network flow watermarking technology achieves good detecting rate and low false positive rate, it could be an effective way to trace the communication connections and supervise anonymous communication. So it is a widely used way for tracing in anonymity systems. In this paper, we introduce some different schemes of network flow watermarking in anonymity systems and discuss some attacks against it. Finally, a conclusion will be given.

목차

Abstract
 1. Introduction
 2. Literature Review
 3. Typical Anonymous Network Flow Watermarking Schemes
  3.1 Overview
  3.2 Inter Packet-Based Anonymous Network Flow Watermarking
  3.3 Interval-Based Anonymous Network Flow Watermarking
  3.4 Interval Centroid-Based Anonymous Network Flow Watermarking
 4. Conclusion
 Acknowledgements
 References

저자정보

  • Tianbo Lu School of Software Engineering,Beijing University of Posts and Telecommunications, 100876, Beijing, China
  • Rui Guo School of Software Engineering,Beijing University of Posts and Telecommunications, 100876, Beijing, China
  • Lingling Zhao School of Software Engineering,Beijing University of Posts and Telecommunications, 100876, Beijing, China
  • Yang Li School of Software Engineering,Beijing University of Posts and Telecommunications, 100876, Beijing, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.