计算机科学 ›› 2011, Vol. 38 ›› Issue (11): 7-11.

• 综述 • 上一篇    下一篇

网络流水印技术研究进展

张连成,王振兴,刘慧生   

  1. (解放军信息工程大学信息工程学院 郑州450002)
  • 出版日期:2018-12-01 发布日期:2018-12-01

Survey on Network Flow Watermarking Technologies

ZHANG Lian-cheng,WANG Zhen-xing,LIU Hui-sheng   

  • Online:2018-12-01 Published:2018-12-01

摘要: 网络流水印技术作为一种主动流量分析手段,可有效追踪恶意匿名通信使用者与跳板链后的真实攻击者,具有准确率高、误报率低和观测时间短等优点,在攻击源追踪、网络监管和攻击取证等领域有着重要应用。首先阐述网络流水印技术的基本框架及主要特点,接着对当前基于包载荷、基于流速率和基于包时间的典型网络流水印技术进行简要介绍,然后概述针对网络流水印技术的时间分析攻击、多流攻击和均方自相关攻击等主要攻击手段与反制对策,最后对网络流水印技术的发展前景进行展望。

关键词: 网络流水印,包时间,时间间隔,扩频通信,多流攻击,均方自相关攻击,匿名通信,跳板

Abstract: As active traffic analysis approaches, network flow watermarking technologies can effectively traceback anonymous abusers and network attackers behind a connection chain of stepping stones. As they can achieve high detection rates and low false positive rates within short observation time, flow watermarking technologies have significant applicadons in many fields, such as attack traceback, network supervision and attack forensic. This paper firstly represented basic framework and major characteristics of flow watermarking technologies, then briefly introduced typical packet payload based, traffic rate based and packet timing based flow watermarking schemes at present, after that, main attack technologies, such as timing analysis attack, multi-flow attack and mean-square autocorrclation attack, and countermeasures of flow watermarking schemes were described, finally, near future research directions were discussed.

Key words: Network flow watermarking, Packet timing, Interval, Spread spectrum, Multi-flow attack, Mcan-square autocorrelation attack, Anonymous communication, Stepping stone

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!