Journal on Communications ›› 2014, Vol. 35 ›› Issue (7): 178-192.doi: 10.3969/j.issn.1000-436x.2014.07.022

• Overview • Previous Articles     Next Articles

Progress in research on active network flow watermark

Xiao-jun GUO1,2,3,Guang CHENG1,3,Chen-gang ZHU1,3,Dinh-Tu TRUONG1,3,Ai-ping ZHOU1,3   

  1. 1 School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
    2 School of Information Engineering, Tibet Nationalities Institute, Xianyang 712082, China
    3 Ministry of Education Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing 210096, China
  • Online:2014-07-25 Published:2017-06-24
  • Supported by:
    Jiangsu Provincial Science and Technology Support Program—Industrial Part;The Future Net-work Proactive Program of Jiangsu Province;The Six Talent Peak Project of Jiangsu Province;The National Basic Research Program (973 Program) of China;The National Natural Science Foundation of China

Abstract:

In face of confirming user communication relationship in anonymous network, tracing botmaster and detecting stepping stones, traditional intrusion detection and flow correlation methods which mainly rely on passive traffic analysis have shown many drawbacks obviously, such as high space costs, poor real-time, low accuracy, poor flexibility, fail in dealing with encrypted traffic and so on. However, the active network flow watermark(ANFW) which combined the idea of digital watermarking and active traffic analysis can overcome the drawbacks above effectively. ANFW has aroused extensive attention of scholars at home and abroad. Firstly, the general model of ANFW is presented, and the classifica-tion of existing proposals and roles involved in ANFW are summarized. Then, several representative ANFW approaches using distinct network flow characteristics are presented and compared in detail. Finally, threats against existing ANFW technology and their corresponding countermeasures are overviewed, also some future research directions about ANFW are discussed.

Key words: network security, active traffic analysis, network flow watermark, network flow characteristics, anonymous communication, stepping stones, botnet

No Suggested Reading articles found!