Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Network security is complex and challenging problem in today's world. Despite of many sophisticated techniques, attack on the network continues to increase. At present, in order to hide the identity of the attacker, attackers send their attack through a chain of compromised hosts that are used as "stepping stones?. In this paper we present an approach to find the connection chain of an intruder for tracing back to the origin especially if the attack through the traffic is encrypted one. Our approach will based on analyzing correlations of encrypted connection between number of packets sent in outgoing connections and that of the incoming packets in the connection. We proposed a correlation scheme based on watermarking which will be robust against timing perturbation. This approach yields effective better results in terms of number of packets than in existing passive timing based correlation. This paper presents a new method of embedding a watermark in traffic flow. Here for the purpose of embedding the watermark, the packet timing is adjusted for specific intervals. By slightly changing the packet timing, we achieve robust correlation of encrypted network against random timing perturbation.

Keywords: Correlation, IPD, Robustness, Stepping stones, Watermark

Edition: Volume 3 Issue 8, August 2014

Pages: 690 - 695

Share this Article

How to Cite this Article?

Saptshree Dengle, Dr. Santosh Lomte, "Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015332, Volume 3 Issue 8, August 2014, 690 - 695

57 PDF Views | 51 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Correlation'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1063 - 1066

A Survey on Automatic Fault Detection Framework for Cloud based Application

Kshitija Nandgaonkar, Swarupa Kamble

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1967 - 1970

Survey on Recommender System using Distributed Framework

Sonali B. Ghodake, R. S. Paswan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 872 - 877

Ranking and Clustering of Software Cost Estimation Models

Vijaya Wable, S. M. Shinde

Share this Article

Similar Articles with Keyword 'Robustness'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 851 - 854

A Review - Translation, Rotation and Scale-Invariant Image Retrieval

Gajendra Paradhi, S. B. Nimbekar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 815 - 819

An Approach for Secure Data Storage Services in Cloud Computing

S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2417 - 2420

Hybridization of Particle Swarm Optimization - A Survey

Geetika, Jaswinder Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1982 - 1986

Enhanced Robust and Reversible Watermarking for Supervised Learning Data

Madhuri V. Gaikwad, Prof. R. A. Kudale

Share this Article

Similar Articles with Keyword 'Watermark'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 651 - 653

Watermark Detection for Security of Multimedia Data through MPC Privacy of Multimedia Data on the Cloud

Ujwala Pawar, Dhara Kurian

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 584 - 586

A Review on Histogram Shifting for Reversible Watermarking Technique

Naina Gaharwar, Dr. Reena Gunjan

Share this Article

Review Papers, Computer Science & Engineering, Jordan, Volume 7 Issue 6, June 2018

Pages: 1713 - 1715

Steganography and Watermarking: Review

Mohammed Salem Atoum

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2420 - 2425

Data hiding Using Texture Synthesis with Watermarking

Aruna M P, Maya Mathew

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this Article
Top