Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/40605
DC Field | Value | |
---|---|---|
dc.title | Normalizing traffic pattern with anonymity for mission critical applications | |
dc.contributor.author | Liu, D. | |
dc.contributor.author | Chi, C.-H. | |
dc.contributor.author | Li, M. | |
dc.date.accessioned | 2013-07-04T08:08:10Z | |
dc.date.available | 2013-07-04T08:08:10Z | |
dc.date.issued | 2004 | |
dc.identifier.citation | Liu, D.,Chi, C.-H.,Li, M. (2004). Normalizing traffic pattern with anonymity for mission critical applications. Proceedings of the IEEE Annual Simulation Symposium : 293-299. ScholarBank@NUS Repository. | |
dc.identifier.issn | 02724715 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40605 | |
dc.description.abstract | Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent traffic pattern of IP-based network from being analyzed. It is an isolated scheme which can be used to prevent traffic analysis in overall network by achieving the same goal in each network segment independently. On each network segment, complementary traffic is generated according to its real traffic, and the combination of these two kinds of traffic constitutes the normalized traffic on each link. Main advantages of our approach are, from the performance viewpoint, 1) complementary traffic does not compete on the bandwidth with real traffic actively, and 2) complementary traffic does not consume the bandwidth of other network segment at all. In addition, by encrypting source and destination IP addresses of each packet, anonymous communication can be achieved and anonymous normalized traffic loses its value for the analysis of eavesdropped traffic by intruders. | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.sourcetitle | Proceedings of the IEEE Annual Simulation Symposium | |
dc.description.page | 293-299 | |
dc.description.coden | PSSYE | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.