Traffic Analysis Prevention. Chris Conger CIS6935 – Cryptographic Protocols 11/16/2004. Outline. What is Traffic Analysis Prevention (TAP)? Problems, challenges with TAP Analysis attacks, typical system vulnerabilities Methods of TAP Case Study: NetCamo Conclusion. Introduction to TAP.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
CIS6935 – Cryptographic Protocols
[FRAN00] Raymond, J.F., “Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems,” International Workshop on Designing Privacy-enhancing Technologies, 2001, pp. 10-29
[FU03] Fu, X., Bettati, R., and Zhao, W., “Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks,” Proceedings of the 32nd International Conference on Parallel Processing, October 2003
[NEWM03] Newman, R., Moskowitz, I., and Syverson, P., “Metrics for Traffic Analysis Prevention,” Proceedings of the Workshop on Privacy-enhancing Technologies, March 2003
[GUAN01] Guan, Y., Fu, X., Xian, D., Shenoy, P., Bettati, R., and Zhao, W., “NetCamo: Camouflaging Network Traffic for QoS-Guaranteed Mission Critical Applications,” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, Vol. 31, No. 4, July 2001