IJESRTJOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY WATERMARK-BASED CORRELATION THROUGH STEPPING STONES IN ENCRYPTED ATTACK TRAFFIC

2016 
In global network intruders having attack their data directly from their own computer. Often, this attack is coming from directly “stepping stones” in order to conceal their identity of data and original data. To identify the source address and data of the attack behind the stepping stone(s), it is required to gather the incoming and outgoing flows or different connections of a stepping stone. To prevent attempts at destination of correlation, the attacker might encrypt or otherwise manipulate the way of connection traffic. Timing based correlation shows in quite effective in the correlating encrypted connections. However, timing based approach are subject to time factor perturbations that may be deliberately introduce by the attacker at traffic destination. In this project, our watermark approach is “active and passive” in that It embeds a unique and single watermark into the encrypted flows in networks by slightly defined the timing of selected packets. The unique and single watermark that is embedded in the encrypted flow gives us a number of benefits over active and passive timing based correlation in resisting timing perturbations by the attacker. A two-fold monotonically increasing compound mapping is created and proved to yield more distinctive and theoretical visible watermarks in the watermarked images. Security protection is defined by parameter and mapping data at destination have also been proposed to deter attackers from illicit image pattern.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    17
    References
    0
    Citations
    NaN
    KQI
    []