• DocumentCode
    1807207
  • Title

    On the secrecy of timing-based active watermarking trace-back techniques

  • Author

    Peng, Pai ; Ning, Peng ; Reeves, Douglas S.

  • Author_Institution
    Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC
  • fYear
    2006
  • fDate
    21-24 May 2006
  • Lastpage
    349
  • Abstract
    Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, these schemes achieve robust correlation for encrypted network connections under timing perturbation. However, the manipulation on packet timing makes the schemes themselves a potential target of intelligent attackers. In this paper, we analyze the secrecy of the timing-based active watermarking techniques for tracing through stepping stones, and propose an attack scheme based on analyzing the packet delays between adjacent stepping stones. We develop attack techniques to infer important watermark parameters, and to recover and duplicate embedded watermarks. The resulting techniques enable an attacker to defeat the tracing systems in certain cases by removing watermarks from the stepping stone connections, or replicating watermarks in non-stepping stone connections. We also develop techniques to determine in real-time whether a stepping stone connection is being watermarked for trace-back purposes. We have performed substantial experiments using real-world data to evaluate these techniques. The experimental results demonstrate that for the watermark scheme being attacked (1) embedded watermarks can be successfully recovered and duplicated when the watermark parameters are not chosen carefully, and (2) the existence of watermarks in a network flow can always be quickly detected
  • Keywords
    cryptography; packet switching; watermarking; embedded watermarks; encrypted network connections; packet delays; packet timing; stepping stone connections; timing perturbation; timing-based active watermarking; trace-back techniques; tracing systems; Computer science; Cryptography; Delay; Forensics; Internet; Laboratories; Performance evaluation; Robustness; Timing; Watermarking;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 2006 IEEE Symposium on
  • Conference_Location
    Berkeley/Oakland, CA
  • ISSN
    1081-6011
  • Print_ISBN
    0-7695-2574-1
  • Type

    conf

  • DOI
    10.1109/SP.2006.28
  • Filename
    1624024