End-to-end Flow Inference of Encrypted MANET

被引:0
|
作者
Chang, Huijun [1 ]
Shan, Hong [1 ]
机构
[1] Inst Elect Engn, Dept Network Engn, Hefei 23003, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST) | 2013年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing traffic analysis techniques are limited by the application environment and data rate when the end-to-end encryption and link encryption are both employed in mobile Ad Hoc networks (MANETs). An end-to-end traffic analysis algorithm is proposed based on time sequence matching and correlation analysis in this paper. According to the characteristics of data flow, the algorithm adopts time sequence matching, correlation analysis, and flow tracer to find the end-to-end flow in the network. The method can infer the traffic pattern without decrypting the frames. Simulation results proved the effectiveness of the method.
引用
收藏
页码:1104 / 1109
页数:6
相关论文
共 50 条
  • [21] A distributed approach to end-to-end network topology inference
    Jin, Xing
    Xia, Qiuyan
    Chan, S. -H. Gary
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1704 - 1709
  • [22] An End-to-End Solution for Spatial Inference in Smart Buildings
    Wu, Mingzhe
    Yao, Fan
    Wang, Hongning
    PROCEEDINGS OF THE 10TH ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILDINGS, CITIES, AND TRANSPORTATION, BUILDSYS 2023, 2023, : 110 - 119
  • [23] Scalable and efficient end-to-end network topology inference
    Jin, Xing
    Tu, Wanqing
    Chan, S. -H. Gary
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, 19 (06) : 837 - 850
  • [24] A Comparison of End-to-End Decision Forest Inference Pipelines
    Guan, Hong
    Masood, Saif
    Dwarampudi, Mahidhar
    Gunda, Venkatesh
    Min, Hong
    Yu, Lei
    Nag, Soham
    Zou, Jia
    PROCEEDINGS OF THE 2023 ACM SYMPOSIUM ON CLOUD COMPUTING, SOCC 2023, 2023, : 200 - 215
  • [25] Network topology inference based on end-to-end measurements
    Jin, Xing
    Yiu, W. -P. Ken
    Chan, S. -H. Gary
    Wang, Yajun
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (12) : 2182 - 2195
  • [26] End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness
    Dodis, Yevgeniy
    Jost, Daniel
    Kesavan, Balachandar
    Marcedone, Antonio
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V, 2023, 14008 : 157 - 189
  • [27] End-to-end Encrypted Scalable Abstract Data Types over ICN
    Tschudin, Christian
    PROCEEDINGS OF THE 5TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN'18), 2018, : 88 - 94
  • [28] A Proposal of QUIC-based CYPHONIC for Encrypted End-to-End Communications
    Horisaki, Shota
    Matama, Kazushige
    Naito, Katsuhiro
    Suzuki, Hidekazu
    2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING, CANDAR, 2022, : 27 - 35
  • [29] Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy
    Wei, Jianghong
    Chen, Xiaofeng
    Wang, Jianfeng
    Hu, Xuexian
    Ma, Jianfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2318 - 2332
  • [30] End-to-end flow monitoring with IPFIX
    Lee, Byungjoon
    Son, Hyeongu
    Yoon, Seunghyun
    Lee, Youngseok
    MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 225 - +