期刊文献+

基于多维正交载体的可裂解流指纹方案 被引量:1

Cracking-resistance net-flow fingerprint scheme based on multi-dimensional orthogonal carriers
下载PDF
导出
摘要 针对流交换中流源身份不可知、流交换范围不可控和流路径不可追踪问题,提出了基于多维正交载体的可裂解流指纹方案。利用2种相互正交的载体提高指纹信息的容量,并通过时间间隔重心载体特性和基于隐马尔科夫模型的解码技术实现可裂解性,提高方案的健壮性。分析了基于重心属性值随机选取载体的反制多流攻击能力,以及不同条件下指纹重心标记算法和基于隐马尔科夫模型解码技术的正确率。最后通过实验对算法的健壮性和隐蔽性进行了探讨。 Aimed at problems of unknown source identity, uncontrollable net-flow exchange mad untraceaole now- ex- changing paths, it proposes cracking-resistance net-flow fingerprint scheme based on multi-dimensional orthogonal carri- ers. It uses two mutually orthogonal carriers so as to improve the capacity of fingerprint information. It achieves crack- ing-resistance by interval centroid carrier characteristics and hidden Markov model based decoding technique. Ultimately, it improves the robustness of scheme. What's more, it analyzes the resistance of multi-flow attack ability by using cen- troid attribute value to select embedding carriers randomly. Besides, it analyzes accuracy of fingerprint centroid algorithm and quantization index modulation decoding technique based on HMM under different cases. Finally, its invisibility and robustness is evaluated by experiments.
出处 《通信学报》 EI CSCD 北大核心 2015年第3期258-268,共11页 Journal on Communications
基金 国家重点基础发展计划("973"计划)基金资助项目(2011CB311801) 国家高技术研究发展计划("863"计划)基金资助项目(2012AA012704) 郑州市科技领军人才基金资助项目(131PLKRC644)~~
关键词 流交换 多维正交载体 可裂解性 指纹重心 指纹字段 net-flow exchange multi-dimensional orthogonal carrier cracking resistance fingerprint centroid finger-print field
  • 相关文献

参考文献27

  • 1ZHU Z, LU G, CHEN Y, et al. Botnet research survey[A]. Computer Software and Applications, 32rid Annual IEEE Intemational[C]. 2008. 967-972.
  • 2张永铮,肖军,云晓春,王风宇.DDoS攻击检测和控制方法[J].软件学报,2012,23(8):2058-2072. 被引量:117
  • 3SCHUBA C L, KRSUL I V, KUHN M (3, et al. Analysis of a denial of service attack on TCP[A].1997 IEEE Symposium on Security and Privacy[C]. 1997.208-223.
  • 4HOUMANSADR A, BORISOV N. The need for flow fingerprints to link correlated network Flows[A]. Privacy Enhancing Technologies[C]. Springer Berlin Heidelberg, 2013.205-224.
  • 5PYUN Y J, PARK Y H, WANG X, et al. Tracing traffic through inter- mediate hosts that repacketize flows[A]. 26th IEEE International Con- ference on Computer Communications[C]. 2007.634-642.
  • 6PYUN Y J, PARK Y, REEVES D S, et al. Interval-based flow water- marking for tracing interactive traffic[J]. Computer Networks, 2012, 56(5): 1646-1665.
  • 7WANG X, CHEN S, JAJODIA S. Network flow watermarking attack on low-latency anonymous communication systems[A] IEEE Sympo- sium on Security and Privacy[C] 2007.116-130.
  • 8KIYAVASH N, HOUMANSADR A, BORISOV N. Multiflow attacks against network flow watermarking schemes[A]. Proceedings of 17th USENIX Security[C]. San Jose, 2008.307-320.
  • 9YU W, FU X, GRAHAM S, et aL DSSS-based flow marking tech- nique for invisible traceback[A]. IEEE Symposium on Security and Privacy[C]. 2007.18-32.
  • 10JIA W, TSO F P, LING Z, et al. Blind detection of spread spectrum flow watermarks[J]. Security and Communication Networks, 2013, 6(3):257-274.

二级参考文献26

共引文献119

同被引文献8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部