End-to-end Flow Inference of Encrypted MANET

被引:0
|
作者
Chang, Huijun [1 ]
Shan, Hong [1 ]
机构
[1] Inst Elect Engn, Dept Network Engn, Hefei 23003, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST) | 2013年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing traffic analysis techniques are limited by the application environment and data rate when the end-to-end encryption and link encryption are both employed in mobile Ad Hoc networks (MANETs). An end-to-end traffic analysis algorithm is proposed based on time sequence matching and correlation analysis in this paper. According to the characteristics of data flow, the algorithm adopts time sequence matching, correlation analysis, and flow tracer to find the end-to-end flow in the network. The method can infer the traffic pattern without decrypting the frames. Simulation results proved the effectiveness of the method.
引用
收藏
页码:1104 / 1109
页数:6
相关论文
共 50 条
  • [31] MANet: End-to-End Learning for Point Cloud Based on Robust Pointpillar and Multiattention
    Gan, Xingli
    Shi, Hao
    Yang, Shan
    Xiao, Yao
    Sun, Lu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [32] End-to-end encrypted network traffic classification method based on deep learning
    Tian Shiming
    Gong Feixiang
    Mo Shuang
    Li Meng
    Wu Wenrui
    Xiao Ding
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2020, 27 (03) : 21 - 30
  • [33] One Time Chat - A Toy End-to-End Encrypted Web Messaging Service
    Kaczynski, Kamil
    Glet, Michal
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 183 - 187
  • [34] Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages
    Seitz, Klara
    Serth, Sebastian
    Krentz, Konrad-Felix
    Meinel, Christoph
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (SENSYS'17), 2017,
  • [35] An End-to-End Encrypted Neural Network for Gradient Updates Transmission in Federated Learning
    Li, Hongyu
    Han, Tianqi
    2019 DATA COMPRESSION CONFERENCE (DCC), 2019, : 589 - 589
  • [36] Inspecting End-to-End Encrypted Communication Differentially for the Efficient Identification of Harmful Media
    Zheng, Tengfei
    Zhou, Tongqing
    Lu, Kai
    Cai, Zhiping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5772 - 5787
  • [37] Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic
    Wichmann, Pascal
    Marx, Matthias
    Federrath, Hannes
    Fischer, Mathias
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [38] End-to-end encrypted network traffic classification method based on deep learning
    Tian S.
    Gong F.
    Mo S.
    Li M.
    Wu W.
    Xiao D.
    Journal of China Universities of Posts and Telecommunications, 2020, 27 (03): : 21 - 30
  • [39] REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT
    Li, Cui
    Chen, Rongmao
    Wang, Yi
    Xing, Qianqian
    Wang, Baosheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4526 - 4542
  • [40] End-to-End Inference of Link Level Queueing Delay Statistics
    Antichi, Gianni
    Di Pietro, Andrea
    Ficara, Domenico
    Giordano, Stefano
    Procissi, Gregorio
    Vitucci, Fabio
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2930 - 2935