Presentation 2008-02-28
A Method to Hide Traffic Flows Using Dummy Packets
Mamoru MIMURA, Yasuhiro NAKAMURA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Currently, some traffic analysis technologies with packet capturing are being developed to observe the usage of the network, because of the rapid increase in the speed and amount of recent traffic. For this reason, some low load methods are proposed. These methods can analyze encrypted traffic without scanning the payload. At the same time, these methods can be a threat to construct secure communication route by encryption. We proposed a method and design of a tunneling application that hides packet's length and transmission intervals against the traffic analysis. However, there is a characteristic that sent packet's number is different from received packet's number in this application. Thus, the malicious third party can guess the traffic flows. This report proposes a method to hide the traffic flows using dummy packets. The results of verification experiment show its performance and the measurement of the communication efficiency.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Traffic Analysis / Encrypted Traffic / Tunneling
Paper # IT2007-32,ISEC2007-129,WBS2007-63
Date of Issue

Conference Information
Committee ISEC
Conference Date 2008/2/21(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Method to Hide Traffic Flows Using Dummy Packets
Sub Title (in English)
Keyword(1) Traffic Analysis
Keyword(2) Encrypted Traffic
Keyword(3) Tunneling
1st Author's Name Mamoru MIMURA
1st Author's Affiliation Department of Computer Science, National Defense Academy()
2nd Author's Name Yasuhiro NAKAMURA
2nd Author's Affiliation Department of Computer Science, National Defense Academy
Date 2008-02-28
Paper # IT2007-32,ISEC2007-129,WBS2007-63
Volume (vol) vol.107
Number (no) 500
Page pp.pp.-
#Pages 8
Date of Issue