International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014


Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle | Dr. Santosh Lomte [2]


Abstract: Network security is complex and challenging problem in today's world. Despite of many sophisticated techniques, attack on the network continues to increase. At present, in order to hide the identity of the attacker, attackers send their attack through a chain of compromised hosts that are used as stepping stones?. In this paper we present an approach to find the connection chain of an intruder for tracing back to the origin especially if the attack through the traffic is encrypted one. Our approach will based on analyzing correlations of encrypted connection between number of packets sent in outgoing connections and that of the incoming packets in the connection. We proposed a correlation scheme based on watermarking which will be robust against timing perturbation. This approach yields effective better results in terms of number of packets than in existing passive timing based correlation. This paper presents a new method of embedding a watermark in traffic flow. Here for the purpose of embedding the watermark, the packet timing is adjusted for specific intervals. By slightly changing the packet timing, we achieve robust correlation of encrypted network against random timing perturbation.


Keywords: Correlation, IPD, Robustness, Stepping stones, Watermark


Edition: Volume 3 Issue 8, August 2014,


Pages: 690 - 695


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Saptshree Dengle, Dr. Santosh Lomte, "Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 690-695, https://www.ijsr.net/get_abstract.php?paper_id=2015332

Similar Articles with Keyword 'Correlation'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 12 Issue 3, March 2023

Pages: 1253 - 1257

Cryptocurrency Prediction using Deep Learning

Abusufiyan Athani | Samarth Kumar [2] | Kirankumar K R | Abhishek Sonavane

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H. | Shivamurthy G. | Rajanna M.

Share this Article
Top