Progress in research on active network flow watermark
In face of confirming user communication relationship in anonymous network, tracing botmaster and detecting stepping stones, traditional intrusion detection and flow correlation methods which mainly rely on passive traffic analysis have shown many drawbacks obviously, such as high space costs, poor...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.07.022/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539729855610880 |
---|---|
author | Xiao-jun GUO Guang CHENG Chen-gang ZHU Dinh-Tu TRUONG Ai-ping ZHOU |
author_facet | Xiao-jun GUO Guang CHENG Chen-gang ZHU Dinh-Tu TRUONG Ai-ping ZHOU |
author_sort | Xiao-jun GUO |
collection | DOAJ |
description | In face of confirming user communication relationship in anonymous network, tracing botmaster and detecting stepping stones, traditional intrusion detection and flow correlation methods which mainly rely on passive traffic analysis have shown many drawbacks obviously, such as high space costs, poor real-time, low accuracy, poor flexibility, fail in dealing with encrypted traffic and so on. However, the active network flow watermark(ANFW) which combined the idea of digital watermarking and active traffic analysis can overcome the drawbacks above effectively. ANFW has aroused extensive attention of scholars at home and abroad. Firstly, the general model of ANFW is presented, and the classifica-tion of existing proposals and roles involved in ANFW are summarized. Then, several representative ANFW approaches using distinct network flow characteristics are presented and compared in detail. Finally, threats against existing ANFW technology and their corresponding countermeasures are overviewed, also some future research directions about ANFW are discussed. |
format | Article |
id | doaj-art-5459582ba6684e098a956b64a5868868 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2014-07-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-5459582ba6684e098a956b64a58688682025-01-14T06:43:51ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-07-013517819259683059Progress in research on active network flow watermarkXiao-jun GUOGuang CHENGChen-gang ZHUDinh-Tu TRUONGAi-ping ZHOUIn face of confirming user communication relationship in anonymous network, tracing botmaster and detecting stepping stones, traditional intrusion detection and flow correlation methods which mainly rely on passive traffic analysis have shown many drawbacks obviously, such as high space costs, poor real-time, low accuracy, poor flexibility, fail in dealing with encrypted traffic and so on. However, the active network flow watermark(ANFW) which combined the idea of digital watermarking and active traffic analysis can overcome the drawbacks above effectively. ANFW has aroused extensive attention of scholars at home and abroad. Firstly, the general model of ANFW is presented, and the classifica-tion of existing proposals and roles involved in ANFW are summarized. Then, several representative ANFW approaches using distinct network flow characteristics are presented and compared in detail. Finally, threats against existing ANFW technology and their corresponding countermeasures are overviewed, also some future research directions about ANFW are discussed.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.07.022/network securityactive traffic analysisnetwork flow watermarknetwork flow characteristicsanonymous communicationstepping stonesBotnet |
spellingShingle | Xiao-jun GUO Guang CHENG Chen-gang ZHU Dinh-Tu TRUONG Ai-ping ZHOU Progress in research on active network flow watermark Tongxin xuebao network security active traffic analysis network flow watermark network flow characteristics anonymous communication stepping stones Botnet |
title | Progress in research on active network flow watermark |
title_full | Progress in research on active network flow watermark |
title_fullStr | Progress in research on active network flow watermark |
title_full_unstemmed | Progress in research on active network flow watermark |
title_short | Progress in research on active network flow watermark |
title_sort | progress in research on active network flow watermark |
topic | network security active traffic analysis network flow watermark network flow characteristics anonymous communication stepping stones Botnet |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.07.022/ |
work_keys_str_mv | AT xiaojunguo progressinresearchonactivenetworkflowwatermark AT guangcheng progressinresearchonactivenetworkflowwatermark AT chengangzhu progressinresearchonactivenetworkflowwatermark AT dinhtutruong progressinresearchonactivenetworkflowwatermark AT aipingzhou progressinresearchonactivenetworkflowwatermark |