Loading…
Privacy enhancement in anonymous network channels using multimodality injection
The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preven...
Saved in:
Published in: | Security and communication networks 2015-11, Vol.8 (16), p.2917-2932 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873 |
---|---|
cites | cdi_FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873 |
container_end_page | 2932 |
container_issue | 16 |
container_start_page | 2917 |
container_title | Security and communication networks |
container_volume | 8 |
creator | Nia, Mehran Alidoost Atani, Reza Ebrahimi Ruiz-Martínez, Antonio |
description | The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk mechanism is responsible for generating network patterns, and the cryptotype performs the micro‐encryption tasks using series of quantum‐resistant cryptography methods through the anonymous channel. The result shows that using this technique, we can prevent network analysis attacks by means of the generation of a different pattern in each execution for the same set of data. Namely, the experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against data analysis attacks because the intruders could consider the generated patterns as the typical patterns. Copyright © 2015 John Wiley & Sons, Ltd.
In order to prevent network analysis attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk is responsible for generating network patterns, and the crypto‐type performs the micro‐encryption tasks through the anonymous channel. The experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against network analysis attacks. |
doi_str_mv | 10.1002/sec.1219 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1762123660</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1762123660</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873</originalsourceid><addsrcrecordid>eNp10E1LxDAQBuAiCuoq-BMKXrxUZ5Js0h5l_YT1A1zxGLLZqWZtU01atf_eiqIoeJqBeWYY3iTZQdhHAHYQye4jw2Il2cCCFxkgY6vfPYr1ZDPGJYBEocRGcnUd3IuxfUr-wXhLNfk2dT41vvF93XQx9dS-NuExtcPcUxXTLjp_n9Zd1bq6WZjKtf2wsSTbusZvJWulqSJtf9VRcntyPJucZdOr0_PJ4TSzgosis0ZSzqAEwdHIucXCAqHMkZVjs1gQCJHPVclKJUso0OSW5GJcWMuLuclzxUfJ3ufdp9A8dxRbXbtoqaqMp-FrjUoyZFxKGOjuH7psuuCH7wbFGIgxcvg5aEMTY6BSPwVXm9BrBP2RrB6S1R_JDjT7pK-uov5fp2-OJ7-9iy29fXsTHrVUXI313eWpPrpQMIOp0lP-Dt-miUk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1722045130</pqid></control><display><type>article</type><title>Privacy enhancement in anonymous network channels using multimodality injection</title><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><creator>Nia, Mehran Alidoost ; Atani, Reza Ebrahimi ; Ruiz-Martínez, Antonio</creator><creatorcontrib>Nia, Mehran Alidoost ; Atani, Reza Ebrahimi ; Ruiz-Martínez, Antonio</creatorcontrib><description>The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk mechanism is responsible for generating network patterns, and the cryptotype performs the micro‐encryption tasks using series of quantum‐resistant cryptography methods through the anonymous channel. The result shows that using this technique, we can prevent network analysis attacks by means of the generation of a different pattern in each execution for the same set of data. Namely, the experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against data analysis attacks because the intruders could consider the generated patterns as the typical patterns. Copyright © 2015 John Wiley & Sons, Ltd.
In order to prevent network analysis attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk is responsible for generating network patterns, and the crypto‐type performs the micro‐encryption tasks through the anonymous channel. The experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against network analysis attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1219</identifier><language>eng</language><publisher>London: Blackwell Publishing Ltd</publisher><subject>anonymous network channels ; Channels ; Computer information security ; Immunity ; Level (quantity) ; multimodality injection ; Network analysis ; network data analysis ; Networks ; Random walk ; self-avoiding random walk ; Tasks ; weighted crypto-type</subject><ispartof>Security and communication networks, 2015-11, Vol.8 (16), p.2917-2932</ispartof><rights>Copyright © 2015 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873</citedby><cites>FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1722045130?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,37013,44590</link.rule.ids></links><search><creatorcontrib>Nia, Mehran Alidoost</creatorcontrib><creatorcontrib>Atani, Reza Ebrahimi</creatorcontrib><creatorcontrib>Ruiz-Martínez, Antonio</creatorcontrib><title>Privacy enhancement in anonymous network channels using multimodality injection</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk mechanism is responsible for generating network patterns, and the cryptotype performs the micro‐encryption tasks using series of quantum‐resistant cryptography methods through the anonymous channel. The result shows that using this technique, we can prevent network analysis attacks by means of the generation of a different pattern in each execution for the same set of data. Namely, the experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against data analysis attacks because the intruders could consider the generated patterns as the typical patterns. Copyright © 2015 John Wiley & Sons, Ltd.
In order to prevent network analysis attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk is responsible for generating network patterns, and the crypto‐type performs the micro‐encryption tasks through the anonymous channel. The experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against network analysis attacks.</description><subject>anonymous network channels</subject><subject>Channels</subject><subject>Computer information security</subject><subject>Immunity</subject><subject>Level (quantity)</subject><subject>multimodality injection</subject><subject>Network analysis</subject><subject>network data analysis</subject><subject>Networks</subject><subject>Random walk</subject><subject>self-avoiding random walk</subject><subject>Tasks</subject><subject>weighted crypto-type</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp10E1LxDAQBuAiCuoq-BMKXrxUZ5Js0h5l_YT1A1zxGLLZqWZtU01atf_eiqIoeJqBeWYY3iTZQdhHAHYQye4jw2Il2cCCFxkgY6vfPYr1ZDPGJYBEocRGcnUd3IuxfUr-wXhLNfk2dT41vvF93XQx9dS-NuExtcPcUxXTLjp_n9Zd1bq6WZjKtf2wsSTbusZvJWulqSJtf9VRcntyPJucZdOr0_PJ4TSzgosis0ZSzqAEwdHIucXCAqHMkZVjs1gQCJHPVclKJUso0OSW5GJcWMuLuclzxUfJ3ufdp9A8dxRbXbtoqaqMp-FrjUoyZFxKGOjuH7psuuCH7wbFGIgxcvg5aEMTY6BSPwVXm9BrBP2RrB6S1R_JDjT7pK-uov5fp2-OJ7-9iy29fXsTHrVUXI313eWpPrpQMIOp0lP-Dt-miUk</recordid><startdate>20151110</startdate><enddate>20151110</enddate><creator>Nia, Mehran Alidoost</creator><creator>Atani, Reza Ebrahimi</creator><creator>Ruiz-Martínez, Antonio</creator><general>Blackwell Publishing Ltd</general><general>Hindawi Limited</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20151110</creationdate><title>Privacy enhancement in anonymous network channels using multimodality injection</title><author>Nia, Mehran Alidoost ; Atani, Reza Ebrahimi ; Ruiz-Martínez, Antonio</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>anonymous network channels</topic><topic>Channels</topic><topic>Computer information security</topic><topic>Immunity</topic><topic>Level (quantity)</topic><topic>multimodality injection</topic><topic>Network analysis</topic><topic>network data analysis</topic><topic>Networks</topic><topic>Random walk</topic><topic>self-avoiding random walk</topic><topic>Tasks</topic><topic>weighted crypto-type</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nia, Mehran Alidoost</creatorcontrib><creatorcontrib>Atani, Reza Ebrahimi</creatorcontrib><creatorcontrib>Ruiz-Martínez, Antonio</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nia, Mehran Alidoost</au><au>Atani, Reza Ebrahimi</au><au>Ruiz-Martínez, Antonio</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy enhancement in anonymous network channels using multimodality injection</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2015-11-10</date><risdate>2015</risdate><volume>8</volume><issue>16</issue><spage>2917</spage><epage>2932</epage><pages>2917-2932</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous communications that could compromise privacy. With the aim of preventing these attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk mechanism is responsible for generating network patterns, and the cryptotype performs the micro‐encryption tasks using series of quantum‐resistant cryptography methods through the anonymous channel. The result shows that using this technique, we can prevent network analysis attacks by means of the generation of a different pattern in each execution for the same set of data. Namely, the experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against data analysis attacks because the intruders could consider the generated patterns as the typical patterns. Copyright © 2015 John Wiley & Sons, Ltd.
In order to prevent network analysis attacks, we propose a scheme that implements a multimodal behavior using the random walk theory and crypto‐types. The random walk is responsible for generating network patterns, and the crypto‐type performs the micro‐encryption tasks through the anonymous channel. The experiments we have developed indicate that the average rate of true detections of application behaviors made by intruders does not exceed 24%. Thus, this multimodal pattern gives a high level of immunity against network analysis attacks.</abstract><cop>London</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sec.1219</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2015-11, Vol.8 (16), p.2917-2932 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_miscellaneous_1762123660 |
source | Publicly Available Content Database (Proquest) (PQ_SDU_P3) |
subjects | anonymous network channels Channels Computer information security Immunity Level (quantity) multimodality injection Network analysis network data analysis Networks Random walk self-avoiding random walk Tasks weighted crypto-type |
title | Privacy enhancement in anonymous network channels using multimodality injection |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T14%3A33%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy%20enhancement%20in%20anonymous%20network%20channels%20using%20multimodality%20injection&rft.jtitle=Security%20and%20communication%20networks&rft.au=Nia,%20Mehran%20Alidoost&rft.date=2015-11-10&rft.volume=8&rft.issue=16&rft.spage=2917&rft.epage=2932&rft.pages=2917-2932&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1219&rft_dat=%3Cproquest_cross%3E1762123660%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4349-ca6e820f0431a6bc19c0e16812f5adde0448b7f2f76f091a8ce6d59cc39ba8873%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1722045130&rft_id=info:pmid/&rfr_iscdi=true |