Traffic analysis is defined as "The process of intercepting and examining traffic transmitted over a network in order to derive mission critical information and deduce information from communication patterns". It is well known that even if the content of packets has been encrypted, the characteristics of the traffic [4] . Prevention of traffic analysis is key issue in network security, especially for network in the battlefield since the traffic patterns within network exhibits different characteristics under different situations and at different times. For example, an unusual change of traffic pattern in military network could mean a change of communication capability, change of level of readiness of could be the precursor of an impending action [5].Traffic analysis is a security attack where an adversary observes the statistical pattern of network traffic to infer sensitive information. Statistical properties such as packets length and inter-arrival time provide valuable information about an application, user's activities, and an underlying system. On the other hand, traffic analysis is categorized as a passive attack that is difficult to detect. In this paper we develop an anonymity mechanism to help hiding user activity over a network. The mechanism provides Synthesized Dummy Traffic Generator (S-DTG) able to synthesize dummy traffic based on samples from real traffic during periods of user inactivity. The statistical properties and the traffic pattern of generated traffic are very similar to those of the real traffic sent during users' activity periods. The close similarity between real and dummy traffic coupled with the ability to generate traffic for an inactivity period of any length makes it difficult for an intruder to differentiate between periods of users' activity and inactivity. We show that our proposed traffic generator is superior to the exiting traffic generator from the point of providing anonymity and hiding user activity.This problem can simply be stated as :"By the act of communicating, even if perfect confidentiality of the actual information is achieved, one can give indications to observing parties of impeding actions, capabilities , chains of command, and level of readiness (from " Research Challenges in High Confidence Networking", DARPA, July, 1998 ) [6] .
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.