語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Transparent identification of networ...
~
Chen, Shiping.
FindBook
Google Book
Amazon
博客來
Transparent identification of network flow and its security applications.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Transparent identification of network flow and its security applications./
作者:
Chen, Shiping.
面頁冊數:
162 p.
附註:
Source: Dissertation Abstracts International, Volume: 68-02, Section: B, page: 1063.
Contained By:
Dissertation Abstracts International68-02B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3252075
Transparent identification of network flow and its security applications.
Chen, Shiping.
Transparent identification of network flow and its security applications.
- 162 p.
Source: Dissertation Abstracts International, Volume: 68-02, Section: B, page: 1063.
Thesis (Ph.D.)--George Mason University, 2007.
Many people believe that flow transformations, such as encryption, network address translation (NAT), timing perturbation, traffic padding (or adding cover traffic, bogus packets), packet dropping, flow mixing, flow splitting and merging, etc., would make one network flow virtually indistinguishable from another. This belief is evidenced by existing anonymizing communication systems and the practice an attacker uses to hide its source and identity.Subjects--Topical Terms:
626642
Computer Science.
Transparent identification of network flow and its security applications.
LDR
:03588nmm 2200313 4500
001
1834872
005
20071127121441.5
008
130610s2007 eng d
035
$a
(UMI)AAI3252075
035
$a
AAI3252075
040
$a
UMI
$c
UMI
100
1
$a
Chen, Shiping.
$3
1923508
245
1 0
$a
Transparent identification of network flow and its security applications.
300
$a
162 p.
500
$a
Source: Dissertation Abstracts International, Volume: 68-02, Section: B, page: 1063.
500
$a
Advisers: Sushil Jajodia; Xinyuan Wang.
502
$a
Thesis (Ph.D.)--George Mason University, 2007.
520
$a
Many people believe that flow transformations, such as encryption, network address translation (NAT), timing perturbation, traffic padding (or adding cover traffic, bogus packets), packet dropping, flow mixing, flow splitting and merging, etc., would make one network flow virtually indistinguishable from another. This belief is evidenced by existing anonymizing communication systems and the practice an attacker uses to hide its source and identity.
520
$a
This dissertation challenges this common belief by investigating network flow identification and its security applications. Specifically, an active timing-based, transparent network flow identification technique; an interval centroid-based watermarking scheme, is proposed. The technique is able to make any sufficiently long flow uniquely identifiable even if (1) it is mixed or merged with a number of other flows, (2) it is split into a number of subflows, and (3) there is a substantial portion of packets dropped. To the best of our knowledge, the technique is the only one in the literature that has such capabilities in flow identifications.
520
$a
This dissertation explores two security applications of flow identification techniques. One is to track anonymous peer-to-peer Voice over IP (VoIP) calls on the Internet, and the other is to provide authentication services to streaming data. This dissertation demonstrates that tracking anonymous peer-to-peer VoIP calls on the Internet is feasible and providing authentication to streaming data without communication overhead is practical.
520
$a
The study of this dissertation shows that traditional flow transformations; such as encryption, NAT, timing perturbation, traffic padding, packet dropping, and flow mixing/splitting/merging, do not necessarily provide the level of anonymity people have expected or believed in. The result of this study also demonstrates that achieving the unlinkability of sender and receiver in low-latency communication systems is much harder than we have realized, and current flow transformation-based low-latency anonymous communication systems need to be revisited.
520
$a
This dissertation also provides a design and implementation of a real-time high-precision watermarking engine. It is the first mechanism that enables one to delay any specified packet of any specified packet flow for any specified duration with precision of 100 microsecond. It has guaranteed precision regardless of the current CPU work load. This implementation design not only guarantees the practicality of the proposed network flow identification technique; but also enriches the highly needed network simulation toolkits repertory.
590
$a
School code: 0883.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
George Mason University.
$3
1019450
773
0
$t
Dissertation Abstracts International
$g
68-02B.
790
1 0
$a
Jajodia, Sushil,
$e
advisor
790
1 0
$a
Wang, Xinyuan,
$e
advisor
790
$a
0883
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3252075
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9225892
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入