Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Download Now
Provided by: International Journal of Engineering Research and Applications (IJERA)
Topic: Security
Format: PDF
Network security is complex and challenging problem in today's world. Despite of many Sophisticated techniques, attack on the network continues to increase. At present, in order to hide the identity of the attacker, attackers send their attack through a chain of compromised hosts that are used as \"Stepping stones\". In this paper, the authors present an approach to find the connection chain of an intruder for tracing back to the origin especially if the attack through the traffic is encrypted one. Their approach will based on analyzing correlations of encrypted connection between number of packets sent in outgoing connections and that of the incoming packets in the connection.
Download Now

Find By Topic