期刊
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
卷 18, 期 5, 页码 2271-2284出版社
IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2019.2947666
关键词
Correlation; Internet; Overlay networks; Relays; Wavelet analysis; Encryption; Anonymity; overlay networks; flow correlation; wavelets; multi-resolution analysis; distributed traffic interception
This study introduces a new strategy to defeat the anonymity of traffic flows within anonymizing networks, using distributed flow-capture, characterization and correlation attacks driven by wavelet-based multi-resolution analysis. This strategy is effective and promising, and can be easily deployed on real-life network equipment.
Government agencies rely more and more heavily on the availability of flexible and intelligent solutions for the interception and analysis of Internet-based telecommunications. Unfortunately, the global lawful interception market has been recently put into a corner by the emerging sophisticated encryption, obfuscation and anonymization technologies provided by modern overlay communication infrastructures. To face this challenge, this work proposes a novel strategy for defeating the anonymity of traffic flows, collected within and at the exit of these anonymizing networks, relying on distributed flow-capture, characterization and correlation attacks driven by wavelet-based multi-resolution analysis. Such a strategy, starting from a properly formalized attack model, results in an effective and promising framework that can be easily deployed on real-life network equipment and can potentially scale by working according to different distribution/parallelization scenarios.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据