期刊文献+

Monte Carlo网络流量伪装

Monte Carlo-Based Network Traffic Camouflage
下载PDF
导出
摘要 针对流量伪装成本高、伪装相似度低等问题,提出一种基于蒙特卡罗的流量伪装方法.通过对所处网络环境的常规流量进行统计分析,获取多重动态特征并建立概率分布过程,利用随机数对已知概率分布抽样,产生动态特征序列并构造伪装流量.理论分析表明,该方法无需部署额外的重路由节点且伪装过程不产生分散数据,可在保证伪装生成效率的前提下降低伪装成本,提高网络性能.实验表明,该方法可降低流量检测的准确度及可信度,与现有包填充方法相比,伪装相似度也有较大改善. Heavy camouflage cost and low camouflage similarity are major problems in the traffic camouflage research. Network traffic camouflage based on the Monte Carlo method is proposed to deal with the problems. To acquire multiple dynamic characteristics and establish the probability distribution, the normal traffic is analyzed. The given probability distribution is then sampled with the generated random numbers to determine the dynamic characteristic sequences and construct the camouflage traffic flow. Theoretical analysis indicates that no extra rerouting nodes are deployed and no dispersion traffic generated. The network cost is reduced, the transport performance improved, and the efficiency guaranteed. Experiments show that the method can degrade the detection accuracy and reliability. Compared to the packet padding method, camouflage similarity is well improves.
出处 《应用科学学报》 CAS CSCD 北大核心 2013年第4期361-367,共7页 Journal of Applied Sciences
基金 国家"973"重点基础研究发展计划基金(No.2007CB307102) 国家"863"高技术研究发展计划基金(No.2007AA01Z2A1)资助
关键词 网络安全 流量伪装 蒙特卡罗 伪装能力 network security, traffic camouflage, Monte Carlo, camouflage capability
  • 相关文献

参考文献1

二级参考文献63

  • 1眭鸿飞,陈建二,陈松乔,朱娜斐.重路由匿名通信系统中基于秘密共享的重路由算法[J].计算机研究与发展,2005,42(10):1660-1666. 被引量:7
  • 2邵立松,窦文华.自相似网络通信量模型研究综述[J].电子与信息学报,2005,27(10):1671-1676. 被引量:10
  • 3李金明,王汝传.DDoS攻击源追踪的一种新包标记方案研究[J].通信学报,2005,26(11):18-23. 被引量:13
  • 4FU Xin-wen, GUAN Yong, GRAHAM B, et al. Using parasite flows to camouflage flow traffic[ C]//Proc of the 3rd IEEE SMC Information Assurance Workshop. New York : IEEE Press,2002 : 57-67.
  • 5DUSI M, CROTYI M, GRINGOLI F, et al. Tunnel hunter: detecting application-layer tunnels with statistical fingerprinting[ J ]. Computer Networks,2009,53( 1 ) :81-97.
  • 6NICOL D M, SCHEAR N. Models of privacy preserving traffic tunneling[ J]. Simulation ,2009,85 (9) :589-607.
  • 7WRIGHT C V,COULL S E,MONROSE F. Traffic morphing: an efficient defense against statistical traffic analysis [ C ]//Proc of the 15th IEEE Network and Distributed System Security Symposium. San Diego:The Internet Society,2009:237-250.
  • 8WRIGHT C V, BALLARD L, MONROSE F,et al. Language identification of encrypted VoIP traffic : Alejandra y Roberto or Alice and Bob [ C]//Proc of the 16th Annual USENIX Security Symposium. Boston : USENIX Association,2007:43-54.
  • 9LIBERATORE M, LEVINE B N. Inferring the sour , of encrypted http connections[ C ]//Proc of the 13th ACM Conference on Computer and Communications Security. [ S. l. ] :ACM Press ,2006:255-263.
  • 10ZLATOKRILOV H, LEVY H. Session privacy enhancement by traffic dispersion[ C ]//Proc of the 25th IEEE International Conference on Computer Communications. Barcelona : IEEE Press,2006 : 12-23.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部