首页> 外文会议>31st International Conference on Distributed Computing Systems >Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping
【24h】

Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping

机译:通过流量整形防御无线网络中的流量分析

获取原文
获取外文期刊封面目录资料

摘要

Traffic analysis has been exploited by attackers to threaten user privacy in wireless networks. As an example, a user's on line activities may be exposed to strangers, even if the traffic is encrypted. However, the existing defense mechanisms against traffic analysis, such as packet padding and traffic morphing, are inefficient because they add noise traffic to blur the traffic features, therefore introducing significant overhead. In this paper, we propose the traffic reshaping technique to thwart traffic analysis. It creates multiple virtual media access control (MAC) interfaces over a single wireless card, dynamically schedules packets over these interfaces, thereby reshaping the packet features on each virtual interface. Hence, features of the original traffic are obscured and unavailable for the adversary to infer users' on line activities. Unlike the existing solutions, traffic reshaping enhances privacy protection without incurring overhead in items of adding noise traffic. We evaluate the performance of traffic reshaping through trace-based experiments. The results show that traffic reshaping is effective and efficient in defending against the traffic analysis attacks.
机译:攻击者已利用流量分析来威胁无线网络中的用户隐私。例如,即使流量被加密,用户的在线活动也可能暴露给陌生人。但是,现有的针对流量分析的防御机制(例如数据包填充和流量变型)效率不高,因为它们会增加噪声流量以使流量功能模糊,从而带来大量开销。在本文中,我们提出了流量重塑技术来阻止流量分析。它在单个无线卡上创建多个虚拟媒体访问控制(MAC)接口,通过这些接口动态调度数据包,从而在每个虚拟接口上重塑数据包功能。因此,原始流量的特征被遮盖了,并且对手无法使用它来推断用户的在线活动。与现有解决方案不同,流量重塑可增强隐私保护,而不会在增加噪声流量的项目上产生开销。我们通过基于跟踪的实验评估流量重塑的性能。结果表明,流量整形可以有效,高效地防御流量分析攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号