Network Flow Watermarking | part of Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures | Wiley-IEEE Press books | IEEE Xplore
Scheduled Maintenance: On Monday, 30 June, IEEE Xplore will undergo scheduled maintenance from 1:00-2:00 PM ET (1800-1900 UTC).
On Tuesday, 1 July, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (1800-2200 UTC).
During these times, there may be intermittent impact on performance. We apologize for any inconvenience.
; ; ; ;

Chapter Abstract:

Flow watermarking is primarily used for linking network flows in application scenarios where packet contents are striped of all linking information. This chapter reviews ...Show More

Chapter Abstract:

Flow watermarking is primarily used for linking network flows in application scenarios where packet contents are striped of all linking information. This chapter reviews network traffic analysis and its utilization in linking network flows, that is, through flow watermarks. It briefly describes different application scenarios for network flow watermarking. The chapter describes the use of flow watermarking for the two applications of stepping stone detection and compromising anonymity networks. The main body of research on flow watermarking encompasses these two applications. The chapter introduces a variant of flow watermarking, called flow fingerprinting. It compares the use of fingerprinting and watermarking for two common applications of active traffic analysis. A flow watermarking system's effectiveness is evaluated based on the features which include robustness, invisibility, and detection accuracy. The chapter describes various issues that may impact a flow watermark's robustness, invisibility, and detection accuracy.

Page(s): 139 - 162
Copyright Year: 2016
Edition: 1
ISBN Information:

Contact IEEE to Subscribe