Towards Provably Invisible Network Flow Fingerprints

11/28/2017
by   Ramin Soltani, et al.
0

Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a watchful adversary Willie. Bob, who receives the set of fingerprinted flows after they pass through the network modeled as a collection of independent and parallel M/M/1 queues, wishes to extract Alice's embedded fingerprints to infer the connection between input and output links of the network. We consider two scenarios: 1) Alice embeds fingerprints in all of the flows; 2) Alice embeds fingerprints in each flow independently with probability p. Assuming that the flow rates are equal, we calculate the maximum number of flows in which Alice can invisibly embed fingerprints while having those fingerprints successfully decoded by Bob. Then, we extend the construction and analysis to the case where flow rates are distinct, and discuss the extension of the network model.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/23/2018

Fundamental Limits of Invisible Flow Fingerprinting

Network flow fingerprinting can be used to de-anonymize communications o...
research
10/18/2021

Data Flow Dissemination in a Network

We consider the following network model motivated, in particular, by blo...
research
07/25/2023

Network Traffic Classification based on Single Flow Time Series Analysis

Network traffic monitoring using IP flows is used to handle the current ...
research
05/01/2020

Evaluation of Elephant-based Algorithms for Flow Table Reduction under Realistic Traffic Distributions

The majority of Internet traffic is caused by a relatively small number ...
research
11/20/2018

Traffic-aware Threshold Adjustment for NFV Scaling using DDPG

Current solutions mostly focus on how to predict traffic, rather than ob...
research
05/19/2019

The Maestro Attack: Orchestrating Malicious Flows with BGP

We present the Maestro attack, a novel Link Flooding Attack (LFA) that l...
research
05/27/2021

Convergence of a Packet Routing Model to Flows Over Time

The mathematical approaches for modeling dynamic traffic can roughly be ...

Please sign up or login with your details

Forgot password? Click here to reset