Network Stream Watermarking

  • Mohammad Ali Nematollahi
  • Chalee Vorakulpipat
  • Hamurabi Gamboa Rosales
Part of the Springer Topics in Signal Processing book series (STSP, volume 11)


Detection of stepping stones is a famous problem in computer security. In order to hide the identity, Internet attackers broadcast their traffic on multiple hosts known as stepping stones. A common approach to detect these hosts is to observe the pattern of hosts’ entering and leaving the network.


Traffic Flow Network Flow Watermark Scheme Watermark Embedding Watermark Technique 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Wu, H.-C., and S.-H.S. Huang. 2010. Neural networks-based detection of stepping-stone intrusion. Expert Systems with Applications 37(2): 1431–1437.CrossRefGoogle Scholar
  2. 2.
    Houmansadr, A. 2012. Design, analysis, and implementation of effective network flow watermarking schemes. University of Illinois at Urbana-Champaign.Google Scholar
  3. 3.
    Houmansadr, A., and N. Borisov. 2011. SWIRL: A scalable watermark to detect correlated network flows. In NDSS. 2011.Google Scholar
  4. 4.
    Houmansadr, A., N. Kiyavash, and N. Borisov. 2014. Non-blind watermarking of network flows. IEEE/ACM Transactions on Networking (TON) 22(4): 1232–1244.CrossRefGoogle Scholar
  5. 5.
    Kiyavash, N., A. Houmansadr., and N. Borisov. 2008. Multi-flow attacks against network flow watermarking schemes. In USENIX security symposium.Google Scholar
  6. 6.
    Lin, Z., and N. Hopper. 2012. New attacks on timing-based network flow watermarks. In Presented as part of the 21st usenix security symposium (USENIX Security 12).Google Scholar
  7. 7.
    Houmansadr, A., N. Kiyavash., and N. Borisov. 2009. RAINBOW: A robust and invisible non-blind watermark for network flows. In NDSS.Google Scholar
  8. 8.
    Bavier, A.C., et al. 2004. Operating systems support for planetary-scale network services. In NSDI.Google Scholar
  9. 9.
    Syverson, P., et al. 2001. Towards an analysis of onion routing security. In Designing privacy enhancing technologies. Berlin: Springer.Google Scholar
  10. 10.
    Chaum, D.L. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2): 84–90.CrossRefGoogle Scholar
  11. 11.
    Boyan, J. 1997. The anonymizer-protecting user privacy on the web.Google Scholar
  12. 12.
    Dingledine, R., N. Mathewson., and P. Syverson. 2004. Tor: The second-generation onion router. DTIC Document.Google Scholar
  13. 13.
    Oh, H.O., et al. 2001. New echo embedding technique for robust and imperceptible audio watermarking. In Acoustics, speech, and signal processing. IEEE international conference on proceedings of (ICASSP’01). IEEE.Google Scholar
  14. 14.
    Back, A., I. Goldberg., and A. Shostack. 2001. Freedom systems 2.1 security issues and analysis. White paper, zero knowledge systems. Inc., May, 2001.Google Scholar
  15. 15.
    Zhang, Y., and V. Paxson. 2000. Detecting stepping stones. In USENIX security symposium.Google Scholar
  16. 16.
    Kumar, R., and B. Gupta. 2016. Stepping stone detection techniques: Classification and state-of-the-art. In Proceedings of the international conference on recent cognizance in wireless communication & image processing. Berlin: Springer.Google Scholar
  17. 17.
    Wang, X., S. Chen., and S. Jajodia. 2007. Network flow watermarking attack on low-latency anonymous communication systems. In Security and privacy. IEEE symposium on SP’07. IEEE.Google Scholar
  18. 18.
    Pyun, Y.J., et al. 2007. Tracing traffic through intermediate hosts that repacketize flows. In INFOCOM 2007. 26th IEEE international conference on computer communications. IEEE.Google Scholar
  19. 19.
    Yu, W., et al. 2007. DSSS-based flow marking technique for invisible traceback. In Security and privacy, 2007. IEEE symposium on SP’07. IEEE.Google Scholar
  20. 20.
    Donoho, D.L., et al. 2002. Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In Recent advances in intrusion detection. Berlin: Springer.Google Scholar
  21. 21.
    Adelsbach, A., S. Katzenbeisser., and H. Veith. 2003. Watermarking schemes provably secure against copy and ambiguity attacks. In Proceedings of the 3rd ACM workshop on digital rights management. ACM.Google Scholar
  22. 22.
    Peng, P., P. Ning., and D.S. Reeves. On the secrecy of timing-based active watermarking trace-back techniques. In IEEE symposium on security and privacy, 2006. IEEE.Google Scholar
  23. 23.
    Sencar, H.T., and N. Memon. 2007. Combatting ambiguity attacks via selective detection of embedded watermarks. IEEE Transactions on Information Forensics and Security 2(4): 664–682.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Singapore 2017

Authors and Affiliations

  • Mohammad Ali Nematollahi
    • 1
  • Chalee Vorakulpipat
    • 1
  • Hamurabi Gamboa Rosales
    • 2
  1. 1.National Electronics and Computer Technology Center (NECTEC)PathumthaniThailand
  2. 2.Universidad Autónoma de ZacatecasZacatecasMexico

Personalised recommendations