2001
DOI: 10.1109/3468.935042
|View full text |Cite
|
Sign up to set email alerts
|

NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications

Abstract: Abstract-This paper presents the general approach, design, implementation, and evaluation of NetCamo, a system to prevent traffic analysis in systems with real-time requirements. Integrated support for both security and real-time is becoming necessary for computer networks that support mission critical applications. This study focusses on how to integrate both the prevention of traffic analysis and guarantees for worst-case delays in an internetwork. We propose and analyze techniques that efficiently camouflag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2002
2002
2013
2013

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 72 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…It is conceptually similar to our embed module, but lacks our generic chopper-reassembler and crypto framework. NetCamo [32] is an algorithm for scheduling transmissions to prevent traffic analysis; it is complementary to any of the above, and could also be deployed within existing relay servers to enhance their resistance to global adversaries. Collage [11] is a scheme for steganographically hiding messages within postings on sites that host user-generated content, such as photos, music, and videos.…”
Section: Related Workmentioning
confidence: 99%
“…It is conceptually similar to our embed module, but lacks our generic chopper-reassembler and crypto framework. NetCamo [32] is an algorithm for scheduling transmissions to prevent traffic analysis; it is complementary to any of the above, and could also be deployed within existing relay servers to enhance their resistance to global adversaries. Collage [11] is a scheme for steganographically hiding messages within postings on sites that host user-generated content, such as photos, music, and videos.…”
Section: Related Workmentioning
confidence: 99%
“…Traffic analysis is one of the most subtle passive attacks; an attacker observes network traffic and surmises sensitive information of the applications of underlying system (Guan et al, 2001). The leakage of sensitive information could create havoc in security sensitive situations.…”
Section: Introductionmentioning
confidence: 99%
“…The work in [18] analyzes traffic at global choke points to determine the global region where a given service is hosted. These attacks can best be countered by saturating the communications channels [19] leaving no available bandwidth for patterns to emerge. Due to the extreme resource requirements of channel saturation, this approach can only be used in extreme cases.…”
Section: Brief Survey Of Side-channel Attacks On Tunneled Protocolsmentioning
confidence: 99%