Unified Comms

Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis

Free registration required

Executive Summary

Recent work has shown that properties of network traffic that remain observable after encryption, namely packet sizes and timing, can reveal surprising information about the traffic's contents (e.g., the language of a VoIP call, passwords in secure shell logins, or even web browsing habits). While there are some legitimate uses for encrypted traffic analysis, these techniques also raise important questions about the privacy of encrypted communications. A common tactic for mitigating such threats is to pad packets to uniform sizes or to send packets at fixed timing intervals; however, this approach is often inefficient.

  • Format: PDF
  • Size: 418.2 KB