Abstract
In cloud environment, a framework for cross-domain collaborative tracking could find intruders hidden behind autonomous domains by linking these autonomous domains effectively. The autonomous domain in framework could select the appropriate intrusion tracking technology to implement intra-domain tracking according to its own operating rules and communication characteristics. As an active traffic analysis technology, network flow watermarking technology could accurately locate the real positions of intruders hidden behind intermediate hosts (stepping stones) and anonymous communication systems. Furthermore, it has many advantages such as high precise rate, low false alarm rate, short observation time and so on. For these advantages and its high efficiency of intra-domain tracking, it has become the hot spot in academe research in recent years. Therefore, this paper did the following work: (1) research on network flow watermarking technology; (2) conclude the implementation framework of network flow watermarking technology; (3) analyze the principles and implementation processes of several mainstream network flow watermarking schemes; (4) analyze threats to network flow watermarking.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Callado, A.: A survey on internet traffic identification. IEEE Commun. Surv. Tutorials 11(3), 37–52 (2009)
Yu, W., Fu, X.: DSSS-based flow marking technique for invisible traceback. In: 2007 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 18–32. IEEE (2007)
Wang, X., Chen, S.: Tracking anonymous peer-to-peer VoIP calls on the internet. In: 12th ACM Conference on Computer and Communications Security, pp. 81–91. ACM, Newyork (2005)
Li, Q.: Safety risk monitoring of cyber-physical power systems based on ensemble learning algorithm. IEEE Access 7, 24788–24805 (2019)
Peng, P., Ning, P.: On the secrecy of timing-based active watermarking trace-back techniques. In: 2006 IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, USA, pp. 315–349. IEEE (2006)
Kiyavash, N., Houmansadr, A.: Multi-flow attacks against network flow watermarking schemes. In: 17th USENIX Security Symposium, pp. 307–320. USENIX Association, Berkeley (2008)
Jia, W., Tso, F.P.: Blind detection of spread spectrum flow watermarks. In: 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, pp. 2195–2203. IEEE (2009)
Luo, X., Zhang, J.: On the secrecy of spread-spectrum flow watermarks. In: Gritzalis, D., Preneel, B. (eds.) European Conference on Research in Computer Security 2010. LNCS, vol. 6345, pp. 232–248. Springer, Heidelberg (2010)
Acknowledgments
This work was supported in part by the Fundamental Research Funds for the Central Universities (30918012204), Military Common Information System Equipment Pre-research Special Technology Project (315075701), 2019 Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of China, 2018 Jiangsu Province Major Technical Research Project “Information Security Simulation System”, Shanghai Aerospace Science and Technology Innovation Fund (SAST2018-103).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, H., Li, Q., Meng, S., Shen, H., Liu, K., Long, H. (2020). Review of Research on Network Flow Watermarking Techniques. In: Zhang, X., Liu, G., Qiu, M., Xiang, W., Huang, T. (eds) Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. CloudComp SmartGift 2019 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 322. Springer, Cham. https://doi.org/10.1007/978-3-030-48513-9_41
Download citation
DOI: https://doi.org/10.1007/978-3-030-48513-9_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-48512-2
Online ISBN: 978-3-030-48513-9
eBook Packages: Computer ScienceComputer Science (R0)