DocumentCode :
2667100
Title :
Tracing Traffic through Intermediate Hosts that Repacketize Flows
Author :
Pyun, Young June ; Park, Young Hee ; Wang, Xinyuan ; Reeves, Douglas S. ; Ning, Peng
Author_Institution :
North Carolina State Univ., Raleigh
fYear :
2007
fDate :
6-12 May 2007
Firstpage :
634
Lastpage :
642
Abstract :
Tracing interactive traffic that traverses stepping stones (i.e., intermediate hosts) is challenging, as the packet headers, lengths, and contents can all be changed by the stepping stones. The traffic timing has therefore been studied as a means of tracing traffic. One such technique uses traffic timing as a side channel into which a watermark, or identifying tag, can be embedded to aid with tracing. The effectiveness of such techniques is greatly reduced when repacketization of the traffic occurs at the stepping stones. Repacketization is a natural effect of many applications, including SSH, and therefore poses a serious challenge for traffic tracing. This paper presents a new method of embedding a watermark in traffic timing, for purposes of tracing the traffic in the presence of repacketization. This method uses an invariant characteristic of two traffic flows which are part of the same stepping stone chain, namely, elapsed time of the flows. The duration of each flow is sliced into short fixed-length intervals. Packet timing is adjusted to manipulate the packet count in specific intervals, for purposes of embedding the watermark. A statistical analysis of the method, with no assumptions or limitations concerning the distribution of packet times, proves the effectiveness of the method given a sufficient number of packets, despite natural and/or deliberate repacketization and perturbation of the traffic timing by an adversary. The method has been implemented and tested on a large number of synthetically-generated SSH traffic flows. The results demonstrate that 100% detection rates and less than 1% false positive rates are achievable under conditions of 2 seconds of maximum timing perturbation and 12% repacketization rate, using fewer than 1000 packets.
Keywords :
Internet; statistical analysis; telecommunication security; telecommunication traffic; watermarking; Internet; interactive traffic tracing; intermediate hosts; repacketization; statistical analysis; stepping stone chain; watermark; Communications Society; Computer science; Delay; Protocols; Software engineering; TCPIP; Timing; Traffic control; USA Councils; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE
Conference_Location :
Anchorage, AK
ISSN :
0743-166X
Print_ISBN :
1-4244-1047-9
Type :
conf
DOI :
10.1109/INFCOM.2007.80
Filename :
4215662
Link To Document :
بازگشت