浏览全部资源
扫码关注微信
江苏大学计算机科学与通信工程学院,江苏 镇江 212013
[ "金华(1977-),男,江苏海安人,江苏大学博士生、副教授,主要研究方向为隐私保护、网络与信息安全。" ]
[ "朱慧(1989-),女,山西大同人,江苏大学硕士生,主要研究方向为网络安全。" ]
[ "王昌达(1971-),男,江苏南京人,博士,江苏大学教授、博士生导师,主要研究方向为网络安全、无线传感器网络、云计算。" ]
网络出版日期:2017-10,
纸质出版日期:2017-10-25
移动端阅览
金华, 朱慧, 王昌达. 基于平滑分组的分组间隔时间流水印方法[J]. 通信学报, 2017,38(10):36-46.
Hua JIN, Hui ZHU, Chang-da WANG. Packets flow watermarking method based on the inter-packet delay with smooth crossed grouping[J]. Journal on communications, 2017, 38(10): 36-46.
金华, 朱慧, 王昌达. 基于平滑分组的分组间隔时间流水印方法[J]. 通信学报, 2017,38(10):36-46. DOI: 10.11959/j.issn.1000-436x.2017196.
Hua JIN, Hui ZHU, Chang-da WANG. Packets flow watermarking method based on the inter-packet delay with smooth crossed grouping[J]. Journal on communications, 2017, 38(10): 36-46. DOI: 10.11959/j.issn.1000-436x.2017196.
针对现有基于时间信道的主动网络流水印技术缺少自纠错和难以抵御熵值隐蔽性嗅探的缺陷,提出一种基于平滑分组的分组间隔时间流水印方法。利用卷积码扩展水印信息,并采用平滑分组的方法将水印信息嵌入数据分组流中,通过交替调制数据分组间隔时间,使水印数据流的分组间隔分布特征无限逼近于正常的网络流,有效降低了数据分组在传输过程中遇到的时延抖动、分组丢失、分组合并、分组分片等因素干扰。理论分析和实验结果均表明,与现有的数据分组流水印技术相比,该方法具有检测准确度高、顽健性和隐蔽性好的特点。
To improve the self-correction ability and resist the entropy-based detection
a flow watermarking approach based on the inter-packets delays with smooth crossed grouping was proposed.Such an approach extended the watermarking methods using both the convolutional code and the smooth group methods to embed the watermarks into packet flows.By adjusting the inter-packets delays of the crossed packets
the transmission time distribution of the watermarked packets can indefinitely approach to that of any normal packets transmission times.Furthermore
the approach can mitigate the negative consequences introduced by packets transmission jitters
packets losses
packets aggregations and packets divisions for the watermarks detection.Both theoretical analysis and experimental results show that the proposed approach overweight the known watermarking methods from the aspects of identification accuracy
robustness and hiddenness.
何高峰 , 杨明 , 罗军舟 , 等 . 洋葱路由追踪技术中时间特征的建模与分析 [J ] . 计算机学报 , 2014 , 2 ( 37 ): 357 - 371 .
HE G F , YANG M , LUO J Z , et al . Modeling and analysis of time characteristics used in onion routing traceback techniques [J ] . Chinese Journal of Computers , 2014 , 2 ( 37 ): 357 - 371 .
郭晓军 , 程光 , 朱琛刚 , 等 . 主动网络流水印技术研究进展 [J ] . 通信学报 , 2014 , 35 ( 7 ): 178 - 192 .
GUO X J , CHENG G , ZHU C G , et al . Progress in research on active network flow watermark [J ] . Journal on Communications , 2014 , 35 ( 7 ): 178 - 192 .
WANG X , REEVES D S . Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays [C ] // ACM Conference on Computer and Communications Security . 2003 : 20 - 29 .
PAN Z , PENG H , LONG X , et al . A watermarking-based host correlation detection scheme [C ] // International Conference on Management of e-Commerce and e-Government . 2009 : 493 - 497 .
PYUN Y J , PARK Y H , WANG X , et al . Tracing traffic through intermediate hosts that repacketize flows [C ] // IEEE International Conference on Computer Communications . 2007 : 634 - 642 .
WANG X , CHEN S , JAJODIA S . Network flow watermarking attack on low-latency anonymous communication systems [C ] // IEEE Symposium on Security and Privacy . 2007 : 116 - 130 .
KIYAVASH N , HOUMANSADR A , BORISOV N . Multi-flow attacks against network flow watermarking schemes [C ] // USENIX Security Symposium . 2008 : 307 - 320 .
张连成 , 王振兴 , 孙建平 . 基于时间间隔的扩频流水印技术 [J ] . 计算机应用研究 , 2011 , 28 ( 8 ): 3049 - 3053 .
ZHANG L C , WANG Z X , SUN J P . Interval-based spectrum watermarking scheme for tracing network flows [J ] . Application Research of Computers , 2011 , 28 ( 8 ): 3049 - 3053 .
张璐 , 罗军舟 , 杨明 , 等 . 基于时隙质心流水印的匿名通信追踪技术 [J ] . 软件学报 , 2011 , 22 ( 10 ): 2358 - 2371 .
ZHANG L , LUO J Z , YANG M , et al . Interval centroid based flow watermarking technique for anonymous communication traceback [J ] . Journal of Software , 2011 , 22 ( 10 ): 2358 - 2371 .
LUO J , WANG X , YANG M . An interval centroid based spread spectrum watermarking scheme for multi-flow traceback [J ] . Journal of Network and Computer Applications , 2012 , 35 ( 1 ): 60 - 71 .
RAMYA K P , REVATHI M K . Protecting streaming data using provenance spread spectrum watermarking [J ] . Research in Computer and Communication Engineering , 2014 , 3 ( 2 ): 2109 - 2114 .
LUO X , ZHANG J , PERDISCI R , et al . On the secrecy of spread-spectrum flow watermarks [C ] // European Symposium on Research in Computer Security . 2010 : 232 - 248 .
DENGLE S , LOMTE S . Active watermarking approach in detecting encrypted traffic attack by making correlation scheme robust [J ] . International Journal of Science and Research , 2014 , 8 ( 3 ): 691 - 695 .
QURESHI A , MEGÍAS D , RIFÀ-POUS H . Framework for preserving security and privacy in peer-to-peer content distribution systems [J ] . Expert Systems with Applications , 2015 , 42 ( 3 ): 1391 - 1408 .
GIANVECCHIO S , WANG H . DSSS-based flow marking technique for invisible traceback channels:an entropy-based approach [C ] // ACM Conference on Computer and Communications Security . 2007 : 307 - 316 .
HOUMANSADR A , KIYAVASH N , BORISOV N . Rainbow:a robust and invisible non-blind watermark for network flows [C ] // 16th Annual Network& Distributed System Security Symposium(NDSS'09) . 2009 : 224 - 236 .
0
浏览量
840
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构