首页> 外文会议>IEEE International Conference on Computer and Communications >Initial offset randomization based multi-flow attack resistance method
【24h】

Initial offset randomization based multi-flow attack resistance method

机译:基于初始偏移随机化的多流抗攻击方法

获取原文

摘要

Multi-flow attack based on inter-flow dependency relationship can constitute a serious threat to packet timing based flow watermarking technologies. Embedding position randomization method can resist multi-flow attack, but it leads to a higher false positive rate. This paper proposed initial offset randomization based multi-flow attack resistance (IOR-MFAR) method, which adopts different random seeds to randomly choose initial offsets for different target network flows to eliminate dependency relationship between watermarked flows. Analysis and empirical evaluation results show that the IOR-MFAR method can effectively defend against multi-flow attack, at the same time, compared with the embedding position randomization method, it doesn't increase the false positive rate of original flow watermarking technology.
机译:基于流间依赖关系的多流攻击可能对基于数据包定时的流水印技术构成严重威胁。嵌入位置随机化方法可以抵抗多流攻击,但会导致较高的假阳性率。本文提出了基于初始偏移量随机化的多流攻击抵抗(IOR-MFAR)方法,该方法采用不同的随机种子为不同的目标网络流随机选择初始偏移量,以消除水印流之间的依赖关系。分析和实证评估结果表明,IOR-MFAR方法能够有效防御多流攻击,同时与嵌入位置随机化方法相比,不会增加原始流水印技术的误报率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号