Enhancement of Flow Watermarking Technique for Encrypted Attack Traffic

Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate nodes. Chain of compromised hosts acting as "Stepping stones". Attack detection system detects stepping-stone connections at the compromised hosts. Encryption and perturbation methods are used to increase the complexity of the detection systems. The survey is carried out under Stepping stone analysis, Encrypted packet analysis, Time perturbation model and Inter Packet Delay analysis model.

Provided by: International Journal of Communications and Engineering Topic: Security Date Added: Mar 2012 Format: PDF

Find By Topic