Survey of side channel attack on encrypted network traffic
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data entered by users.A model of side channel atta...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-08-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021050 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529902667399168 |
---|---|
author | Ding LI Yuefei ZHU Bin LU Wei LIN |
author_facet | Ding LI Yuefei ZHU Bin LU Wei LIN |
author_sort | Ding LI |
collection | DOAJ |
description | By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data entered by users.A model of side channel attack on encrypted network traffic according to information theory was developed.Based on the unified model, the methods and results of representative attacks such as fingerprinting attacks, keystroke attacks and speech attacks were analyzed in detail.Furthermore, defense methods of hiding packet size and timing information were discussed.At last, possible research directions were prospected with the frontiers of technology development. |
format | Article |
id | doaj-art-9e62c27ea9334d79b4bcce5034861c31 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2021-08-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-9e62c27ea9334d79b4bcce5034861c312025-01-15T03:15:06ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-08-01711413059567861Survey of side channel attack on encrypted network trafficDing LIYuefei ZHUBin LUWei LINBy analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data entered by users.A model of side channel attack on encrypted network traffic according to information theory was developed.Based on the unified model, the methods and results of representative attacks such as fingerprinting attacks, keystroke attacks and speech attacks were analyzed in detail.Furthermore, defense methods of hiding packet size and timing information were discussed.At last, possible research directions were prospected with the frontiers of technology development.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021050web applicationencrypted trafficside channel attackinformation gain |
spellingShingle | Ding LI Yuefei ZHU Bin LU Wei LIN Survey of side channel attack on encrypted network traffic 网络与信息安全学报 web application encrypted traffic side channel attack information gain |
title | Survey of side channel attack on encrypted network traffic |
title_full | Survey of side channel attack on encrypted network traffic |
title_fullStr | Survey of side channel attack on encrypted network traffic |
title_full_unstemmed | Survey of side channel attack on encrypted network traffic |
title_short | Survey of side channel attack on encrypted network traffic |
title_sort | survey of side channel attack on encrypted network traffic |
topic | web application encrypted traffic side channel attack information gain |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021050 |
work_keys_str_mv | AT dingli surveyofsidechannelattackonencryptednetworktraffic AT yuefeizhu surveyofsidechannelattackonencryptednetworktraffic AT binlu surveyofsidechannelattackonencryptednetworktraffic AT weilin surveyofsidechannelattackonencryptednetworktraffic |