Loading…

Privacy enhancement in anonymous network channels using multimodality injection

The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preven...

Full description

Saved in:
Bibliographic Details
Published in:Security and communication networks 2015-11, Vol.8 (16), p.2917-2932
Main Authors: Nia, Mehran Alidoost, Atani, Reza Ebrahimi, Ruiz-Martínez, Antonio
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873
cites cdi_FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873
container_end_page 2932
container_issue 16
container_start_page 2917
container_title Security and communication networks
container_volume 8
creator Nia, Mehran Alidoost
Atani, Reza Ebrahimi
Ruiz-Martínez, Antonio
description The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk mechanism is responsible for generating network patterns, and the cryptotype performs the micro‐encryption tasks using series of quantum‐resistant cryptography methods through the anonymous channel. The result shows that using this technique, we can prevent network analysis attacks by means of the generation of a different pattern in each execution for the same set of data. Namely, the experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against data analysis attacks because the intruders could consider the generated patterns as the typical patterns. Copyright © 2015 John Wiley & Sons, Ltd. In order to prevent network analysis attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk is responsible for generating network patterns, and the crypto‐type performs the micro‐encryption tasks through the anonymous channel. The experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against network analysis attacks.
doi_str_mv 10.1002/sec.1219
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1762123660</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1762123660</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873</originalsourceid><addsrcrecordid>eNp10E1LxDAQBuAiCuoq-BMKXrxUZ5Js0h5l_YT1A1zxGLLZqWZtU01atf_eiqIoeJqBeWYY3iTZQdhHAHYQye4jw2Il2cCCFxkgY6vfPYr1ZDPGJYBEocRGcnUd3IuxfUr-wXhLNfk2dT41vvF93XQx9dS-NuExtcPcUxXTLjp_n9Zd1bq6WZjKtf2wsSTbusZvJWulqSJtf9VRcntyPJucZdOr0_PJ4TSzgosis0ZSzqAEwdHIucXCAqHMkZVjs1gQCJHPVclKJUso0OSW5GJcWMuLuclzxUfJ3ufdp9A8dxRbXbtoqaqMp-FrjUoyZFxKGOjuH7psuuCH7wbFGIgxcvg5aEMTY6BSPwVXm9BrBP2RrB6S1R_JDjT7pK-uov5fp2-OJ7-9iy29fXsTHrVUXI313eWpPrpQMIOp0lP-Dt-miUk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1722045130</pqid></control><display><type>article</type><title>Privacy enhancement in anonymous network channels using multimodality injection</title><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><creator>Nia, Mehran Alidoost ; Atani, Reza Ebrahimi ; Ruiz-Martínez, Antonio</creator><creatorcontrib>Nia, Mehran Alidoost ; Atani, Reza Ebrahimi ; Ruiz-Martínez, Antonio</creatorcontrib><description>The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk mechanism is responsible for generating network patterns, and the cryptotype performs the micro‐encryption tasks using series of quantum‐resistant cryptography methods through the anonymous channel. The result shows that using this technique, we can prevent network analysis attacks by means of the generation of a different pattern in each execution for the same set of data. Namely, the experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against data analysis attacks because the intruders could consider the generated patterns as the typical patterns. Copyright © 2015 John Wiley &amp; Sons, Ltd. In order to prevent network analysis attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk is responsible for generating network patterns, and the crypto‐type performs the micro‐encryption tasks through the anonymous channel. The experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against network analysis attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1219</identifier><language>eng</language><publisher>London: Blackwell Publishing Ltd</publisher><subject>anonymous network channels ; Channels ; Computer information security ; Immunity ; Level (quantity) ; multimodality injection ; Network analysis ; network data analysis ; Networks ; Random walk ; self-avoiding random walk ; Tasks ; weighted crypto-type</subject><ispartof>Security and communication networks, 2015-11, Vol.8 (16), p.2917-2932</ispartof><rights>Copyright © 2015 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873</citedby><cites>FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1722045130?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,37013,44590</link.rule.ids></links><search><creatorcontrib>Nia, Mehran Alidoost</creatorcontrib><creatorcontrib>Atani, Reza Ebrahimi</creatorcontrib><creatorcontrib>Ruiz-Martínez, Antonio</creatorcontrib><title>Privacy enhancement in anonymous network channels using multimodality injection</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk mechanism is responsible for generating network patterns, and the cryptotype performs the micro‐encryption tasks using series of quantum‐resistant cryptography methods through the anonymous channel. The result shows that using this technique, we can prevent network analysis attacks by means of the generation of a different pattern in each execution for the same set of data. Namely, the experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against data analysis attacks because the intruders could consider the generated patterns as the typical patterns. Copyright © 2015 John Wiley &amp; Sons, Ltd. In order to prevent network analysis attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk is responsible for generating network patterns, and the crypto‐type performs the micro‐encryption tasks through the anonymous channel. The experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against network analysis attacks.</description><subject>anonymous network channels</subject><subject>Channels</subject><subject>Computer information security</subject><subject>Immunity</subject><subject>Level (quantity)</subject><subject>multimodality injection</subject><subject>Network analysis</subject><subject>network data analysis</subject><subject>Networks</subject><subject>Random walk</subject><subject>self-avoiding random walk</subject><subject>Tasks</subject><subject>weighted crypto-type</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp10E1LxDAQBuAiCuoq-BMKXrxUZ5Js0h5l_YT1A1zxGLLZqWZtU01atf_eiqIoeJqBeWYY3iTZQdhHAHYQye4jw2Il2cCCFxkgY6vfPYr1ZDPGJYBEocRGcnUd3IuxfUr-wXhLNfk2dT41vvF93XQx9dS-NuExtcPcUxXTLjp_n9Zd1bq6WZjKtf2wsSTbusZvJWulqSJtf9VRcntyPJucZdOr0_PJ4TSzgosis0ZSzqAEwdHIucXCAqHMkZVjs1gQCJHPVclKJUso0OSW5GJcWMuLuclzxUfJ3ufdp9A8dxRbXbtoqaqMp-FrjUoyZFxKGOjuH7psuuCH7wbFGIgxcvg5aEMTY6BSPwVXm9BrBP2RrB6S1R_JDjT7pK-uov5fp2-OJ7-9iy29fXsTHrVUXI313eWpPrpQMIOp0lP-Dt-miUk</recordid><startdate>20151110</startdate><enddate>20151110</enddate><creator>Nia, Mehran Alidoost</creator><creator>Atani, Reza Ebrahimi</creator><creator>Ruiz-Martínez, Antonio</creator><general>Blackwell Publishing Ltd</general><general>Hindawi Limited</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20151110</creationdate><title>Privacy enhancement in anonymous network channels using multimodality injection</title><author>Nia, Mehran Alidoost ; Atani, Reza Ebrahimi ; Ruiz-Martínez, Antonio</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>anonymous network channels</topic><topic>Channels</topic><topic>Computer information security</topic><topic>Immunity</topic><topic>Level (quantity)</topic><topic>multimodality injection</topic><topic>Network analysis</topic><topic>network data analysis</topic><topic>Networks</topic><topic>Random walk</topic><topic>self-avoiding random walk</topic><topic>Tasks</topic><topic>weighted crypto-type</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nia, Mehran Alidoost</creatorcontrib><creatorcontrib>Atani, Reza Ebrahimi</creatorcontrib><creatorcontrib>Ruiz-Martínez, Antonio</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nia, Mehran Alidoost</au><au>Atani, Reza Ebrahimi</au><au>Ruiz-Martínez, Antonio</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy enhancement in anonymous network channels using multimodality injection</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2015-11-10</date><risdate>2015</risdate><volume>8</volume><issue>16</issue><spage>2917</spage><epage>2932</epage><pages>2917-2932</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk mechanism is responsible for generating network patterns, and the cryptotype performs the micro‐encryption tasks using series of quantum‐resistant cryptography methods through the anonymous channel. The result shows that using this technique, we can prevent network analysis attacks by means of the generation of a different pattern in each execution for the same set of data. Namely, the experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against data analysis attacks because the intruders could consider the generated patterns as the typical patterns. Copyright © 2015 John Wiley &amp; Sons, Ltd. In order to prevent network analysis attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk is responsible for generating network patterns, and the crypto‐type performs the micro‐encryption tasks through the anonymous channel. The experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against network analysis attacks.</abstract><cop>London</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sec.1219</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2015-11, Vol.8 (16), p.2917-2932
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_miscellaneous_1762123660
source Publicly Available Content Database (Proquest) (PQ_SDU_P3)
subjects anonymous network channels
Channels
Computer information security
Immunity
Level (quantity)
multimodality injection
Network analysis
network data analysis
Networks
Random walk
self-avoiding random walk
Tasks
weighted crypto-type
title Privacy enhancement in anonymous network channels using multimodality injection
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T14%3A33%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy%20enhancement%20in%20anonymous%20network%20channels%20using%20multimodality%20injection&rft.jtitle=Security%20and%20communication%20networks&rft.au=Nia,%20Mehran%20Alidoost&rft.date=2015-11-10&rft.volume=8&rft.issue=16&rft.spage=2917&rft.epage=2932&rft.pages=2917-2932&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1219&rft_dat=%3Cproquest_cross%3E1762123660%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1722045130&rft_id=info:pmid/&rfr_iscdi=true