With an increasing amount of internet traffic becoming encrypted, traffic analysis attacks have become a more important topic lately. One of the most common and effective ways to prevent traffic analysis is link padding, where dummy traffic is added to hide the real traffic pattern. In principle, link padding can perfectly hide the underlying traffic. In practice however, it has been shown to be very difficult to implement correctly and has also been shown to be ineffective if not correctly implemented. In this paper we provide an information theoretic analysis of the effectiveness of a link padding implementation. We represent the imperfections of a padding implementation as a covert channel and determine the capacity of the information le...
Web traffic is exposed to potential eavesdroppers, and despite the use of encryption mechanisms, it ...
Indirect communication channels have been effectively employed in the communications world to bypass...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
We consider the problem of using artificially generated cover traffic to hide the network paths used...
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though ...
Low latency anonymity systems are susceptive to traffic anal-ysis attacks. In this paper, we propose...
Due to the character of the original source materials and the nature of batch digitization, quality ...
An attacker can gain information of a user by analyzing its network traffic. The size of transferred...
An increasing number of recent experimental works have demonstrated that the supposedly secure chann...
Traffic flow features like packet lengths, direction, gap times have been shown to carry significant...
Last-mile links connect a core network to the end-user’s communication infrastructure. A single user...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
Security and privacy have gained more and more attention with the rapid growth and public acceptance...
This paper studies countermeasures to traffic analysis attacks. A common strategy for such counterme...
Abstract Traffic analysis has definitely shown that encryption is not enough to protect the privacy ...
Web traffic is exposed to potential eavesdroppers, and despite the use of encryption mechanisms, it ...
Indirect communication channels have been effectively employed in the communications world to bypass...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
We consider the problem of using artificially generated cover traffic to hide the network paths used...
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though ...
Low latency anonymity systems are susceptive to traffic anal-ysis attacks. In this paper, we propose...
Due to the character of the original source materials and the nature of batch digitization, quality ...
An attacker can gain information of a user by analyzing its network traffic. The size of transferred...
An increasing number of recent experimental works have demonstrated that the supposedly secure chann...
Traffic flow features like packet lengths, direction, gap times have been shown to carry significant...
Last-mile links connect a core network to the end-user’s communication infrastructure. A single user...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
Security and privacy have gained more and more attention with the rapid growth and public acceptance...
This paper studies countermeasures to traffic analysis attacks. A common strategy for such counterme...
Abstract Traffic analysis has definitely shown that encryption is not enough to protect the privacy ...
Web traffic is exposed to potential eavesdroppers, and despite the use of encryption mechanisms, it ...
Indirect communication channels have been effectively employed in the communications world to bypass...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...