Survey of side channel attack on encrypted network traffic

By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data entered by users.A model of side channel atta...

Full description

Saved in:
Bibliographic Details
Main Authors: Ding LI, Yuefei ZHU, Bin LU, Wei LIN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-08-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021050
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529902667399168
author Ding LI
Yuefei ZHU
Bin LU
Wei LIN
author_facet Ding LI
Yuefei ZHU
Bin LU
Wei LIN
author_sort Ding LI
collection DOAJ
description By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data entered by users.A model of side channel attack on encrypted network traffic according to information theory was developed.Based on the unified model, the methods and results of representative attacks such as fingerprinting attacks, keystroke attacks and speech attacks were analyzed in detail.Furthermore, defense methods of hiding packet size and timing information were discussed.At last, possible research directions were prospected with the frontiers of technology development.
format Article
id doaj-art-9e62c27ea9334d79b4bcce5034861c31
institution Kabale University
issn 2096-109X
language English
publishDate 2021-08-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-9e62c27ea9334d79b4bcce5034861c312025-01-15T03:15:06ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-08-01711413059567861Survey of side channel attack on encrypted network trafficDing LIYuefei ZHUBin LUWei LINBy analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data entered by users.A model of side channel attack on encrypted network traffic according to information theory was developed.Based on the unified model, the methods and results of representative attacks such as fingerprinting attacks, keystroke attacks and speech attacks were analyzed in detail.Furthermore, defense methods of hiding packet size and timing information were discussed.At last, possible research directions were prospected with the frontiers of technology development.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021050web applicationencrypted trafficside channel attackinformation gain
spellingShingle Ding LI
Yuefei ZHU
Bin LU
Wei LIN
Survey of side channel attack on encrypted network traffic
网络与信息安全学报
web application
encrypted traffic
side channel attack
information gain
title Survey of side channel attack on encrypted network traffic
title_full Survey of side channel attack on encrypted network traffic
title_fullStr Survey of side channel attack on encrypted network traffic
title_full_unstemmed Survey of side channel attack on encrypted network traffic
title_short Survey of side channel attack on encrypted network traffic
title_sort survey of side channel attack on encrypted network traffic
topic web application
encrypted traffic
side channel attack
information gain
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021050
work_keys_str_mv AT dingli surveyofsidechannelattackonencryptednetworktraffic
AT yuefeizhu surveyofsidechannelattackonencryptednetworktraffic
AT binlu surveyofsidechannelattackonencryptednetworktraffic
AT weilin surveyofsidechannelattackonencryptednetworktraffic