Font Size: a A A

Traffic Camouflaging Technology And Its Cost Analysis

Posted on:2008-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z B ShaoFull Text:PDF
GTID:2178360215979861Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of information technology, computer network has been widely used for the communication among individual, community and government section. More and more network users are concerned with the security of network. Many traditional schemes for network security pay more attention to secure source-destination payload information by the means of encryption. However, it is not enough to prevent traffic analysis efficiently by the application of encryption only. In order to meet the security requirement, it is imperative to make a research on the countermeasure of traffic analysis.In this paper, we firstly present the various types of traffic analysis attack and their characters and then describe the technology of traffic analysis and related works on the countermeasure of traffic analysis. The shortage of original host-based rerouting algorithm is analyzed in detail and the improvement to it is also done. At the same time, the analysis to the complexity of improved algorithm is carried out and the cost due to original and improved algorithm is compared as well. The analysis and experimental results show that the improved algorithm eliminates inconsistency in the outputting result and decrease the cost due to rerouting.In this paper we also extend original path selecting scheme in the process of rerouting and analyze both the cost of host-based rerouting and the cost of padding in terms of expected value. The analysis result shows that the overhead of rerouting is higher than the cost of padding when the number of nodes is greater than nine. In order to improve the performance of network, we should choose suitable methods to camouflage the network traffic.
Keywords/Search Tags:Traffic Analysis, Traffic Camouflaging, Rerouting, Muddy Padding, Cost Analysis
PDF Full Text Request
Related items