1
Computer Science
Active Timing-Based Correlation of Perturbed Traffic Flows with - - PowerPoint PPT Presentation
Computer Science Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets Pai Peng, Peng Ning, Douglas Reeves North Carolina State Univ. Xinyuan Wang George Mason Univ. 1 Attack Through Stepping Stones Telnet/ Attack
1
Computer Science
2
Computer Science
Stepping Stone Telnet/ SSH Telnet/ SSH Attacker Victim Stepping Stone Attack
Stepping Stone Telnet/ SSH Attacker Victim Attack
3
Computer Science
4
Computer Science
5
Computer Science
6
Computer Science
7
Computer Science
8
Computer Science
9
Computer Science
10
Computer Science
– Encode is ok, need to change decode
– Find possible matching packets – Decode watermarks from all possible matching flows. – Use the “best” watermark that has the smallest hamming distance to the
– Can detect any flow that probabilistic watermark scheme can.
– No packet loss/merge through stepping stone connections. – The delays between corresponding packets are bounded by a maximum delay Δ (timing constraint). – The orders of packets are kept the same (order constraint).
11
Computer Science
12
Computer Science
13
Computer Science
first
14
Computer Science
15
Computer Science
16
Computer Science
17
Computer Science
18
Computer Science
19
Computer Science
20
Computer Science