Gabriel-Cosmin Apostol, Bogdan-Costel Mocanu, Dragos-Mihai Radulescu, Ionut Petre, Florin Pop
{"title":"Hiding cloud network access patterns for enhanced privacy","authors":"Gabriel-Cosmin Apostol, Bogdan-Costel Mocanu, Dragos-Mihai Radulescu, Ionut Petre, Florin Pop","doi":"10.1109/RoEduNet57163.2022.9920974","DOIUrl":null,"url":null,"abstract":"The cybersecurity landscape in the last years has evolved significantly. Considering the fact that more than 281 million people were affected by cyber-threads in 2021 with an estimated financial impact of more than $15.680 million, the research for security mechanisms for better services has risen significantly. One of the most active trends in cybersecurity offensive procedures is perimeter breaching. This represents the incipient step that attackers take when they target external networks. On average the penetration of the internal networks takes no more than two days, therefore, the defense mechanisms should comply with this hard deadline. Therefore, in this paper, we propose a real-time approach that solves the privacy issues posed by network protocol profiling and surveillance. This can be done by disguising the generated traffic using different transport protocols like chat or gaming services. In order to choose the right channels which can be used, we identified the most prominent ones like Extensible Messaging and Presence Protocol (XMPP) or Internet Relay Chat (IRC) chat and the AllJoyn network, a service used mainly for multiplayer communication in gaming environments on mobile terminals. We evaluate the proposed solution considering metrics such as time frame, speed, and rate limiting delay.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RoEduNet57163.2022.9920974","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The cybersecurity landscape in the last years has evolved significantly. Considering the fact that more than 281 million people were affected by cyber-threads in 2021 with an estimated financial impact of more than $15.680 million, the research for security mechanisms for better services has risen significantly. One of the most active trends in cybersecurity offensive procedures is perimeter breaching. This represents the incipient step that attackers take when they target external networks. On average the penetration of the internal networks takes no more than two days, therefore, the defense mechanisms should comply with this hard deadline. Therefore, in this paper, we propose a real-time approach that solves the privacy issues posed by network protocol profiling and surveillance. This can be done by disguising the generated traffic using different transport protocols like chat or gaming services. In order to choose the right channels which can be used, we identified the most prominent ones like Extensible Messaging and Presence Protocol (XMPP) or Internet Relay Chat (IRC) chat and the AllJoyn network, a service used mainly for multiplayer communication in gaming environments on mobile terminals. We evaluate the proposed solution considering metrics such as time frame, speed, and rate limiting delay.