TY - GEN
T1 - Performance analysis of real traffic carried with encrypted cover flows
AU - Schear, Nabil
AU - Nicol, David M.
N1 - Copyright:
Copyright 2008 Elsevier B.V., All rights reserved.
PY - 2008
Y1 - 2008
N2 - Encrypted protocols, such as SSL, are becoming more prevalent because of the growing use of e-commerce, anonymity services, and secure authentication. Likewise, traffic analysis is becoming more common because it is often the only way to analyze these protocols. Though there are many valid uses for traffic analysis (such as network policy enforcement and intrusion detection), it can also be used to maliciously compromise the secrecy or privacy of a user. While the payload can be strongly protected by encryption, analysis of traffic patterns can yield information about the type and nature of traffic. In this paper we use simulation and an analytic model to examine the impact on user experience of a scheme that masks the behavior of real traffic by embedding it in synthetic, encrypted, cover traffic. This point provides a novel context where we observe the synergy of simulation and analytic modeling. We show that a detailed simulation model of network traffic characteristics can be used to estimate the parameters of an analytic model of tunneling.
AB - Encrypted protocols, such as SSL, are becoming more prevalent because of the growing use of e-commerce, anonymity services, and secure authentication. Likewise, traffic analysis is becoming more common because it is often the only way to analyze these protocols. Though there are many valid uses for traffic analysis (such as network policy enforcement and intrusion detection), it can also be used to maliciously compromise the secrecy or privacy of a user. While the payload can be strongly protected by encryption, analysis of traffic patterns can yield information about the type and nature of traffic. In this paper we use simulation and an analytic model to examine the impact on user experience of a scheme that masks the behavior of real traffic by embedding it in synthetic, encrypted, cover traffic. This point provides a novel context where we observe the synergy of simulation and analytic modeling. We show that a detailed simulation model of network traffic characteristics can be used to estimate the parameters of an analytic model of tunneling.
UR - http://www.scopus.com/inward/record.url?scp=50849134581&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=50849134581&partnerID=8YFLogxK
U2 - 10.1109/PADS.2008.15
DO - 10.1109/PADS.2008.15
M3 - Conference contribution
AN - SCOPUS:50849134581
SN - 9780769531595
T3 - Proceedings - Workshop on Principles of Advanced and Distributed Simulation, PADS
SP - 80
EP - 87
BT - Proceedings - 22nd Workshop on Principles of Advanced and Distributed Simulation, PADS 2008
T2 - 22nd Workshop on Principles of Advanced and Distributed Simulation, PADS 2008
Y2 - 3 June 2008 through 6 June 2008
ER -