Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Mar 30, 2012 · Tracing interactive attack traffic that traverses stepping stones (i.e., intermediate hosts) is challenging, as the packet headers, lengths, ...
This paper presents a new method of embedding a watermark in traffic timing, for purposes of tracing the traffic in the presence of flow splitting, chaff ...
This paper proposes a Multi-flow Attack Resistant Interval-Based Watermarking (MAR-IBW) scheme for tracing multiple network flows, which survives multi-flow ...
Nov 30, 2023 · Network flow watermark technology is a traffic marking technique that embeds watermark information into the characteristics of network flows ...
Jan 11, 2024 · This paper proposes a Multi-flow Attack Resistant Interval-Based Watermarking (MAR-IBW) scheme for tracing multiple network flows, which ...
A new method of embedding a watermark in traffic timing, for purposes of tracing the traffic in the presence of repacketization, which demonstrates the ...
Active traffic analysis, so called network flow water- ... Interval-based watermarking schemes [12, 15, 18, 7] ... Tracing traffic through intermediate hosts that ...
Abstract—Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic network adminis- tration often takes advantage of TA ...
SWIRL is an interval-based watermark, but it uses a novel approach to resist multi-flow attacks. The watermark pattern is chosen based on the characteristics of ...
Dec 1, 2022 · A sliding window based L1 distance computation algorithm is proposed to detect flow watermark at a low overhead. Experimental results ...