Efficient chaff-aided obfuscation in resource constrained environments

E. Ciftcioglu, R. Hardy, L. Scott, Kevin S. Chan
{"title":"Efficient chaff-aided obfuscation in resource constrained environments","authors":"E. Ciftcioglu, R. Hardy, L. Scott, Kevin S. Chan","doi":"10.1109/MILCOM.2017.8170843","DOIUrl":null,"url":null,"abstract":"This work considers the use of obfuscation against a global eavesdropper in a resource-constrained environment. We assume a network where network traffic (queries) is not always present on the network but is stochastic in nature. Even if the traffic is encrypted and the payload of packets are secure, under the threat of a passive adversary, activity over the links might be subjected to traffic analysis through network monitoring. To counter leakage of contextual information to such an adversary, the operator is able to mask the presence of traffic over a link if it normalizes link activity by adding chaffs. However, adding chaff to all links all the time might consume too much of the operators resources. Similarly, the adversary may try to eavesdrop over all links to observe any traffic pattern change to perform analysis. However, due to the bursty nature of link traffic and the high cost of operating and collecting information from all eavesdropping units, the adversary might not want or be able to operate all eavesdroppers simultaneously. The possibility that links may not be subject to eavesdropping might lead the operator to being more lenient in the use of chaff packets. If we incorporate operational (e.g. cost of chaffs) plus contextual (obfuscation score) costs as payoffs, we highlight the existence of a mixed strategy equilibria for employing chaff. The goal of this paper is to construct a two-player game that characterize the proper amount of chaff deployment given varying eavesdropping strategies. Several basic network examples are provided to demonstrate the effectiveness of this mixed strategy which can be extended into larger scenarios. Our analysis uncovers counter-intuitive insights on the areas of the network for the adversary to eavesdrop. We also identify conditions for existence of pure strategy Nash Equilibrium for various settings like a two-hop network.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2017.8170843","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

This work considers the use of obfuscation against a global eavesdropper in a resource-constrained environment. We assume a network where network traffic (queries) is not always present on the network but is stochastic in nature. Even if the traffic is encrypted and the payload of packets are secure, under the threat of a passive adversary, activity over the links might be subjected to traffic analysis through network monitoring. To counter leakage of contextual information to such an adversary, the operator is able to mask the presence of traffic over a link if it normalizes link activity by adding chaffs. However, adding chaff to all links all the time might consume too much of the operators resources. Similarly, the adversary may try to eavesdrop over all links to observe any traffic pattern change to perform analysis. However, due to the bursty nature of link traffic and the high cost of operating and collecting information from all eavesdropping units, the adversary might not want or be able to operate all eavesdroppers simultaneously. The possibility that links may not be subject to eavesdropping might lead the operator to being more lenient in the use of chaff packets. If we incorporate operational (e.g. cost of chaffs) plus contextual (obfuscation score) costs as payoffs, we highlight the existence of a mixed strategy equilibria for employing chaff. The goal of this paper is to construct a two-player game that characterize the proper amount of chaff deployment given varying eavesdropping strategies. Several basic network examples are provided to demonstrate the effectiveness of this mixed strategy which can be extended into larger scenarios. Our analysis uncovers counter-intuitive insights on the areas of the network for the adversary to eavesdrop. We also identify conditions for existence of pure strategy Nash Equilibrium for various settings like a two-hop network.
资源受限环境下有效的箔条辅助混淆
这项工作考虑了在资源受限的环境中对全局窃听者使用混淆。我们假设一个网络,其中网络流量(查询)并不总是存在于网络上,但本质上是随机的。即使流量是加密的,数据包的有效负载是安全的,在被动对手的威胁下,链路上的活动也可能要通过网络监控进行流量分析。为了防止上下文信息泄露给这样的对手,如果通过添加箔条使链接活动正常化,运营商就能够掩盖链接上流量的存在。然而,一直在所有链接中添加箔条可能会消耗过多的运营商资源。同样,攻击者可能试图窃听所有链接,以观察任何流量模式变化以执行分析。然而,由于链路流量的突发性质以及从所有窃听单元操作和收集信息的高成本,攻击者可能不希望或无法同时操作所有窃听器。链路可能不会受到窃听的可能性可能导致运营商在使用箔条包时更加宽松。如果我们将操作(如箔条成本)加上上下文(混淆分数)成本作为回报,我们强调了使用箔条的混合策略均衡的存在。本文的目标是构建一个二人博弈,该博弈描述了在不同窃听策略下箔条部署的适当数量。给出了几个基本的网络实例来证明这种混合策略的有效性,这种策略可以扩展到更大的场景。我们的分析揭示了对手窃听网络区域的反直觉见解。我们还确定了各种情况下纯策略纳什均衡存在的条件,如两跳网络。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信