Please use this identifier to cite or link to this item:
|Title:||Normalizing traffic pattern with anonymity for mission critical applications|
|Authors:||Liu, D. |
|Source:||Liu, D.,Chi, C.-H.,Li, M. (2004). Normalizing traffic pattern with anonymity for mission critical applications. Proceedings of the IEEE Annual Simulation Symposium : 293-299. ScholarBank@NUS Repository.|
|Abstract:||Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent traffic pattern of IP-based network from being analyzed. It is an isolated scheme which can be used to prevent traffic analysis in overall network by achieving the same goal in each network segment independently. On each network segment, complementary traffic is generated according to its real traffic, and the combination of these two kinds of traffic constitutes the normalized traffic on each link. Main advantages of our approach are, from the performance viewpoint, 1) complementary traffic does not compete on the bandwidth with real traffic actively, and 2) complementary traffic does not consume the bandwidth of other network segment at all. In addition, by encrypting source and destination IP addresses of each packet, anonymous communication can be achieved and anonymous normalized traffic loses its value for the analysis of eavesdropped traffic by intruders.|
|Source Title:||Proceedings of the IEEE Annual Simulation Symposium|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Dec 9, 2017
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.