WATERMARK-BASED CORRELATION THROUGH STEPPING STONES IN ENCRYPTED ATTACK TRAFFIC

Abstract

In global network intruders having attack their data directly from their own computer. Often, this attack is coming from directly “stepping stones” in order to conceal their identity of data and original data. To identify the source address and data of the attack behind the stepping stone(s), it is required to gather the incoming and outgoing flows or different connections of a stepping stone. To prevent attempts at destination of correlation, the attacker might encrypt or otherwise manipulate the way of connection traffic. Timing based correlation shows in quite effective in the correlating encrypted connections. However, timing based approach are subject to time factor perturbations that may be deliberately introduce by the attacker at traffic destination. In this project, our watermark approach is “active and passive” in that It embeds a unique and single watermark into the encrypted flows in networks by slightly defined the timing of selected packets. The unique and single watermark that is embedded in the encrypted flow gives us a number of benefits over active and passive timing based correlation in resisting timing perturbations by the attacker. A two-fold monotonically increasing compound mapping is created and proved to yield more distinctive and theoretical visible watermarks in the watermarked images. Security protection is defined by parameter and mapping data at destination have also been proposed to deter attackers from illicit image pattern.

Authors and Affiliations

Mr. Sachin Ghadge

Keywords

Related Articles

 Multi Level Anti Theft Security System using GSM Technology

 This paper presents Design & Development of Multi level Anti theft security system to control the theft of a vehicle using GSM and Biometrics. The main objective of this is to offer an advanced security system...

 A REVIEW PAPER ON PROFILE CLONE DETECTION IN SOCIAL NETWORKS

 An online social network is used day by day. Social networking is one of the trendiest Internet behaviors, with billions of users from around the humanity. The times use up on public networking sites like facebook,...

 Unsteady Couette Flow of a Bingham Fluid in Contact with a Jeffrey Fluid

 In this paper, unsteady Couette flow of a Bingham fluid in contact with a Newtonian fluid in a channel bounded by parallel plates is investigated. The flow region is divided in to lower and upper regions. The lowe...

An Efficient Framework For Internet Banking

Detecting and identifying any phishing websites in real dynamic problem involving many factors and criteria. Because of the subjective considerations and the ambiguities involved in the detection, data mining technique...

SMART PARKING SOLUTIONS FOR SMART CITIES BASED ON WIRELESS SENSOR NETWORKS

Urban commuting has become a nightmare for a common man who travels to and from work daily in a city. The traffic gets even worse on weekends, as almost half the road is occupied by cars searching for parking. To avoid...

Download PDF file
  • EP ID EP128044
  • DOI -
  • Views 61
  • Downloads 0

How To Cite

Mr. Sachin Ghadge (0). WATERMARK-BASED CORRELATION THROUGH STEPPING STONES IN ENCRYPTED ATTACK TRAFFIC. International Journal of Engineering Sciences & Research Technology, 5(1), 60-66. https://europub.co.uk/articles/-A-128044