Advertisement

Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks

  • Ming Li
  • Huamin Feng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4222)

Abstract

We propose a novel approach to chaotically mask traffic pattern according to a predetermined chaotic mode, aiming at making the masked traffic lose values for intruders to analyze for malicious activities in a mission critical network.

Keywords

Wireless Sensor Network Traffic Pattern Chaotic Time Series Malicious Activity Transport Layer Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401Google Scholar
  2. 2.
    Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246 Google Scholar
  3. 3.
    Li, M.: Computer & Security 23, 549–558 (2004); 25, 213–220 (2006)Google Scholar
  4. 4.
    Baran, P.: On Distributed Communications: IX Security, Secrecy, and Tamper-Free Considerations. Memo RM-3765-PR, Rand Corp. (1964)Google Scholar
  5. 5.
    Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Sys. Tech. J. 28, 656–715 (1949)MATHMathSciNetGoogle Scholar
  6. 6.
    Deng, J., Han, R., Mishra, S.: Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks. In: Int. Conf., Dependable Systems and Networks, pp. 594–603 (2004)Google Scholar
  7. 7.
    Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. TR CU-CS-987-04, University of Colorado at Boulder (2004)Google Scholar
  8. 8.
    Liu, D.X., Chi, C.-H., Li, M.: Normalizing Traffic Pattern with Anonymity for Mission Critical Applications. In: 37th Annu. Simulation Symposium, Virginia, pp. 293–299 (2004)Google Scholar
  9. 9.
    Alligood, K.T., Sauer, T.D., Yorke, J.A.: Chaos: An Introduction to Dynamical Systems. Springer, Heidelberg (1997)Google Scholar
  10. 10.
    Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). RFC 2409 Google Scholar
  11. 11.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ming Li
    • 1
  • Huamin Feng
    • 2
  1. 1.School of Information Science & TechnologyEast China Normal UniversityShanghaiPR. China
  2. 2.Key Laboratory of Security and Secrecy of InformationBeijing Electronic Science and Technology InstituteBeijingPR. China

Personalised recommendations