Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Network security is complex and challenging problem in today's world. Despite of many sophisticated techniques, attack on the network continues to increase. At present, in order to hide the identity of the attacker, attackers send their attack through a chain of compromised hosts that are used as "stepping stones?. In this paper we present an approach to find the connection chain of an intruder for tracing back to the origin especially if the attack through the traffic is encrypted one. Our approach will based on analyzing correlations of encrypted connection between number of packets sent in outgoing connections and that of the incoming packets in the connection. We proposed a correlation scheme based on watermarking which will be robust against timing perturbation. This approach yields effective better results in terms of number of packets than in existing passive timing based correlation. This paper presents a new method of embedding a watermark in traffic flow. Here for the purpose of embedding the watermark, the packet timing is adjusted for specific intervals. By slightly changing the packet timing, we achieve robust correlation of encrypted network against random timing perturbation.

Keywords: Correlation, IPD, Robustness, Stepping stones, Watermark

Edition: Volume 3 Issue 8, August 2014

Pages: 690 - 695

Share this Article

How to Cite this Article?

Saptshree Dengle, Dr. Santosh Lomte, "Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015332, Volume 3 Issue 8, August 2014, 690 - 695

116 PDF Views | 107 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Correlation'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 872 - 877

Ranking and Clustering of Software Cost Estimation Models

Vijaya Wable, S. M. Shinde

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2297 - 2299

Measuring and Comparing Semantic Structure of Ontology

Nirmitee N. Kurhekar, Prof. L. J. Sankpal

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2790 - 2794

Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis

Sucheta Gulia, Dr. Rajan Vohra

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Similar Articles with Keyword 'Robustness'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1769 - 1771

A Review of Comparatively Study of Different Speaker Recognition Techniques

Umer Malik

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1641 - 1646

Discrete Z Transformation based Copyright Protection on Digital Image Using Genetic Algorithm

Prashant C. Harne, Rajesh K. Nigam

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 815 - 819

An Approach for Secure Data Storage Services in Cloud Computing

S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 851 - 854

A Review - Translation, Rotation and Scale-Invariant Image Retrieval

Gajendra Paradhi, S. B. Nimbekar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1169 - 1172

Image Registration Using MAC RANSAC

Krishma, Navpreet Kaur Walia

Share this Article

Similar Articles with Keyword 'Watermark'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2153 - 2156

Effective Watermarking Techniques on Structured Datasets

Mini Joswin, Deeksha Bhardwaj

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1641 - 1646

Discrete Z Transformation based Copyright Protection on Digital Image Using Genetic Algorithm

Prashant C. Harne, Rajesh K. Nigam

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 651 - 653

Watermark Detection for Security of Multimedia Data through MPC Privacy of Multimedia Data on the Cloud

Ujwala Pawar, Dhara Kurian

Share this Article
Top