首页> 外文会议>2019 IEEE International Conference on Pervasive Computing and Communications Workshops >Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing
【24h】

Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing

机译:通过流量变形保护IoT环境免受流量分析攻击

获取原文
获取原文并翻译 | 示例

摘要

Traffic analysis attacks allow an attacker to infer sensitive information about users by analyzing network traffic of user devices. These attacks are passive in nature and are difficult to detect. In this paper, we demonstrate that an adversary, with access to upstream traffic from a smart home network, can identify the device types and user interactions with IoT devices, with significant confidence. These attacks are practical even when device traffic is encrypted because they only utilize statistical properties, such as traffic rates, for analysis. In order to mitigate the privacy implications of traffic analysis attacks, we propose a traffic morphing technique, which shapes network traffic thus making it more difficult to identify IoT devices and their activities. Our evaluation shows that the proposed technique provides protection against traffic analysis attacks and prevent privacy leakages for smart home users.
机译:流量分析攻击允许攻击者通过分析用户设备的网络流量来推断有关用户的敏感信息。这些攻击本质上是被动的,很难检测到。在本文中,我们证明了可以从智能家居网络访问上游流量的对手可以以极大的信心识别设备类型以及用户与IoT设备的交互。即使对设备流量进行加密,这些攻击也很实用,因为它们仅利用流量流量之类的统计属性进行分析。为了减轻流量分析攻击对隐私的影响,我们提出了一种流量变形技术,该技术可以对网络流量进行整形,从而使识别物联网设备及其活动更加困难。我们的评估表明,提出的技术可为流量分析攻击提供保护,并防止智能家居用户的隐私泄露。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号