Matches in SemOpenAlex for { <https://semopenalex.org/work/W2912587999> ?p ?o ?g. }
Showing items 1 to 73 of
73
with 100 items per page.
- W2912587999 endingPage "221" @default.
- W2912587999 startingPage "217" @default.
- W2912587999 abstract "Network based intruders seldom attack their victims directly from their own computer. Often, they stage their attacks through intermediate “stepping stones” in order to conceal their identity and origin. To identify the source of the attack behind the stepping stone(s), it is necessary to correlate the incoming and outgoing flows or connections of a stepping stone. To resist attempts at correlation, the attacker may encrypt or otherwise manipulate the connection traffic. Timing based correlation approaches have been shown to be quite effective in correlating encrypted connections. However, timing based correlation approaches are subject to timing perturbations that may be deliberately introduced by the attacker at stepping stones. The proposed a novel watermark-based correlation scheme that is designed specifically to be robust against timing perturbations. Unlike most previous timing based correlation approaches, the watermark-based approach is “active” in that it embeds a unique watermark into the encrypted flows by slightly adjusting the timing of selected packets. The unique watermark that is embedded in the encrypted flow gives us a number of advantages over passive timing based correlation in resisting timing perturbations by the attacker. In contrast to existing passive correlation approaches, the proposed watermark based correlation does not make any limiting assumptions about the distribution or random process of the original inter-packet timing of the packet flow. In theory, the watermark based correlation can achieve arbitrarily close to 100% correlation true positive rate and arbitrarily close to 0% false positive rate at the same time for sufficiently long flows, despite arbitrarily large (but bounded) timing perturbations of any distribution by the attacker. The work in this is the first that identifies 1) accurate quantitative tradeoffs between the achievable correlation effectiveness and the defining characteristics of the timing perturbation; 2) a provable upper bound on the number of packets needed to achieve desired correlation effectiveness, given the amount of timing perturbation." @default.
- W2912587999 created "2019-02-21" @default.
- W2912587999 creator A5063376983 @default.
- W2912587999 date "2017-01-01" @default.
- W2912587999 modified "2023-09-24" @default.
- W2912587999 title "Robust Correlation of Encrypted Attack Traffic" @default.
- W2912587999 hasPublicationYear "2017" @default.
- W2912587999 type Work @default.
- W2912587999 sameAs 2912587999 @default.
- W2912587999 citedByCount "0" @default.
- W2912587999 crossrefType "journal-article" @default.
- W2912587999 hasAuthorship W2912587999A5063376983 @default.
- W2912587999 hasConcept C11413529 @default.
- W2912587999 hasConcept C115961682 @default.
- W2912587999 hasConcept C117220453 @default.
- W2912587999 hasConcept C120226833 @default.
- W2912587999 hasConcept C148730421 @default.
- W2912587999 hasConcept C150817343 @default.
- W2912587999 hasConcept C154945302 @default.
- W2912587999 hasConcept C158379750 @default.
- W2912587999 hasConcept C164112704 @default.
- W2912587999 hasConcept C181149355 @default.
- W2912587999 hasConcept C2524010 @default.
- W2912587999 hasConcept C33923547 @default.
- W2912587999 hasConcept C38652104 @default.
- W2912587999 hasConcept C41008148 @default.
- W2912587999 hasConcept C79403827 @default.
- W2912587999 hasConceptScore W2912587999C11413529 @default.
- W2912587999 hasConceptScore W2912587999C115961682 @default.
- W2912587999 hasConceptScore W2912587999C117220453 @default.
- W2912587999 hasConceptScore W2912587999C120226833 @default.
- W2912587999 hasConceptScore W2912587999C148730421 @default.
- W2912587999 hasConceptScore W2912587999C150817343 @default.
- W2912587999 hasConceptScore W2912587999C154945302 @default.
- W2912587999 hasConceptScore W2912587999C158379750 @default.
- W2912587999 hasConceptScore W2912587999C164112704 @default.
- W2912587999 hasConceptScore W2912587999C181149355 @default.
- W2912587999 hasConceptScore W2912587999C2524010 @default.
- W2912587999 hasConceptScore W2912587999C33923547 @default.
- W2912587999 hasConceptScore W2912587999C38652104 @default.
- W2912587999 hasConceptScore W2912587999C41008148 @default.
- W2912587999 hasConceptScore W2912587999C79403827 @default.
- W2912587999 hasIssue "9" @default.
- W2912587999 hasLocation W29125879991 @default.
- W2912587999 hasOpenAccess W2912587999 @default.
- W2912587999 hasPrimaryLocation W29125879991 @default.
- W2912587999 hasRelatedWork W132487297 @default.
- W2912587999 hasRelatedWork W1498264249 @default.
- W2912587999 hasRelatedWork W154633427 @default.
- W2912587999 hasRelatedWork W1795786057 @default.
- W2912587999 hasRelatedWork W2079526900 @default.
- W2912587999 hasRelatedWork W2146486112 @default.
- W2912587999 hasRelatedWork W2149517094 @default.
- W2912587999 hasRelatedWork W2351246898 @default.
- W2912587999 hasRelatedWork W2572579712 @default.
- W2912587999 hasRelatedWork W2607766774 @default.
- W2912587999 hasRelatedWork W2795059600 @default.
- W2912587999 hasRelatedWork W2807669647 @default.
- W2912587999 hasRelatedWork W2810304817 @default.
- W2912587999 hasRelatedWork W2899928928 @default.
- W2912587999 hasRelatedWork W2902198978 @default.
- W2912587999 hasRelatedWork W2945318758 @default.
- W2912587999 hasRelatedWork W2951318252 @default.
- W2912587999 hasRelatedWork W3197591006 @default.
- W2912587999 hasRelatedWork W70373061 @default.
- W2912587999 hasRelatedWork W2181398102 @default.
- W2912587999 hasVolume "9" @default.
- W2912587999 isParatext "false" @default.
- W2912587999 isRetracted "false" @default.
- W2912587999 magId "2912587999" @default.
- W2912587999 workType "article" @default.