Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Transparent identification of networ...
~
Chen, Shiping.
Linked to FindBook
Google Book
Amazon
博客來
Transparent identification of network flow and its security applications.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Transparent identification of network flow and its security applications./
Author:
Chen, Shiping.
Description:
162 p.
Notes:
Source: Dissertation Abstracts International, Volume: 68-02, Section: B, page: 1063.
Contained By:
Dissertation Abstracts International68-02B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3252075
Transparent identification of network flow and its security applications.
Chen, Shiping.
Transparent identification of network flow and its security applications.
- 162 p.
Source: Dissertation Abstracts International, Volume: 68-02, Section: B, page: 1063.
Thesis (Ph.D.)--George Mason University, 2007.
Many people believe that flow transformations, such as encryption, network address translation (NAT), timing perturbation, traffic padding (or adding cover traffic, bogus packets), packet dropping, flow mixing, flow splitting and merging, etc., would make one network flow virtually indistinguishable from another. This belief is evidenced by existing anonymizing communication systems and the practice an attacker uses to hide its source and identity.Subjects--Topical Terms:
626642
Computer Science.
Transparent identification of network flow and its security applications.
LDR
:03588nmm 2200313 4500
001
1834872
005
20071127121441.5
008
130610s2007 eng d
035
$a
(UMI)AAI3252075
035
$a
AAI3252075
040
$a
UMI
$c
UMI
100
1
$a
Chen, Shiping.
$3
1923508
245
1 0
$a
Transparent identification of network flow and its security applications.
300
$a
162 p.
500
$a
Source: Dissertation Abstracts International, Volume: 68-02, Section: B, page: 1063.
500
$a
Advisers: Sushil Jajodia; Xinyuan Wang.
502
$a
Thesis (Ph.D.)--George Mason University, 2007.
520
$a
Many people believe that flow transformations, such as encryption, network address translation (NAT), timing perturbation, traffic padding (or adding cover traffic, bogus packets), packet dropping, flow mixing, flow splitting and merging, etc., would make one network flow virtually indistinguishable from another. This belief is evidenced by existing anonymizing communication systems and the practice an attacker uses to hide its source and identity.
520
$a
This dissertation challenges this common belief by investigating network flow identification and its security applications. Specifically, an active timing-based, transparent network flow identification technique; an interval centroid-based watermarking scheme, is proposed. The technique is able to make any sufficiently long flow uniquely identifiable even if (1) it is mixed or merged with a number of other flows, (2) it is split into a number of subflows, and (3) there is a substantial portion of packets dropped. To the best of our knowledge, the technique is the only one in the literature that has such capabilities in flow identifications.
520
$a
This dissertation explores two security applications of flow identification techniques. One is to track anonymous peer-to-peer Voice over IP (VoIP) calls on the Internet, and the other is to provide authentication services to streaming data. This dissertation demonstrates that tracking anonymous peer-to-peer VoIP calls on the Internet is feasible and providing authentication to streaming data without communication overhead is practical.
520
$a
The study of this dissertation shows that traditional flow transformations; such as encryption, NAT, timing perturbation, traffic padding, packet dropping, and flow mixing/splitting/merging, do not necessarily provide the level of anonymity people have expected or believed in. The result of this study also demonstrates that achieving the unlinkability of sender and receiver in low-latency communication systems is much harder than we have realized, and current flow transformation-based low-latency anonymous communication systems need to be revisited.
520
$a
This dissertation also provides a design and implementation of a real-time high-precision watermarking engine. It is the first mechanism that enables one to delay any specified packet of any specified packet flow for any specified duration with precision of 100 microsecond. It has guaranteed precision regardless of the current CPU work load. This implementation design not only guarantees the practicality of the proposed network flow identification technique; but also enriches the highly needed network simulation toolkits repertory.
590
$a
School code: 0883.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
George Mason University.
$3
1019450
773
0
$t
Dissertation Abstracts International
$g
68-02B.
790
1 0
$a
Jajodia, Sushil,
$e
advisor
790
1 0
$a
Wang, Xinyuan,
$e
advisor
790
$a
0883
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3252075
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9225892
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login