2017
DOI: 10.1515/popets-2017-0050
|View full text |Cite
|
Sign up to set email alerts
|

TagIt: Tagging Network Flows using Blind Fingerprints

Abstract: Flow fingerprinting is a mechanism for linking obfuscated network flows at large scale. In this paper, we introduce the first blind flow fingerprinting system called TagIt. Our system works by modulating fingerprint signals into the timing patterns of network flows through slightly delaying packets into secret time intervals only known to the fingerprinting parties. We design TagIt to to enable reliable fingerprint extraction by legitimate fingerprinting parties despite natural network noise, but invisible to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 38 publications
0
12
0
Order By: Relevance
“…While ow correlation is the core of a multitude of attacks on Tor [3,8,20,22,28,38,39,49,52,54,70,72,72,83], existing ow correlation algorithms are assumed to be ine ective in linking Tor connections reliably and at scale [37,55,66]. This is due to Tor's extremely noisy network that applies large perturbations on Tor ows, therefore rendering tra c features across associated ingress and egress Tor ows hard to get reliably correlated.…”
Section: This Paper's Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…While ow correlation is the core of a multitude of attacks on Tor [3,8,20,22,28,38,39,49,52,54,70,72,72,83], existing ow correlation algorithms are assumed to be ine ective in linking Tor connections reliably and at scale [37,55,66]. This is due to Tor's extremely noisy network that applies large perturbations on Tor ows, therefore rendering tra c features across associated ingress and egress Tor ows hard to get reliably correlated.…”
Section: This Paper's Contributionsmentioning
confidence: 99%
“…While previous work has studied di erent countermeasures against ow correlation and similar tra c analysis attacks [2,9,19,35,41,42,50,56,61,82], they remain mostly non-deployed presumably due to the poor performance of existing ow correlation techniques at large scale [60,66]. In the following, we discuss two possible countermeasures.…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the carrier type, NFW is usually classified into four categories: content [5], timing [6], size [7], and rate-based [8]. In these categories, however, timing-based watermarking [9,10], in which the carrier signal is the arrival or departure time of the packets observed at a certain network node, has been mostly researched.…”
Section: Introductionmentioning
confidence: 99%
“…Rezaei et al. [24] introduce an active fingerprinting method called TagIt that works by slightly delaying packets into secret time intervals. In [25], [26], the authors consider watermarking and analyze invisibility and error probability of watermarking schemes in practice.…”
mentioning
confidence: 99%