22.07.2013 Views

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Preventing Traffic Analysis<br />

[Jiang00iaas,Jiang00tech]<br />

Even with encryption, an eavesdropper may be able<br />

to identify the traffic pattern in the network<br />

Traffic patterns can give away information about the<br />

mode of operation<br />

Attack versus retreat<br />

Traffic analysis can be prevented by presenting<br />

“constant” traffic pattern independent of the<br />

underlying operational mode<br />

May need insertion of dummy traffic to achieve this<br />

406

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!