Hiding cloud network access patterns for enhanced privacy

Gabriel-Cosmin Apostol, Bogdan-Costel Mocanu, Dragos-Mihai Radulescu, Ionut Petre, Florin Pop
{"title":"Hiding cloud network access patterns for enhanced privacy","authors":"Gabriel-Cosmin Apostol, Bogdan-Costel Mocanu, Dragos-Mihai Radulescu, Ionut Petre, Florin Pop","doi":"10.1109/RoEduNet57163.2022.9920974","DOIUrl":null,"url":null,"abstract":"The cybersecurity landscape in the last years has evolved significantly. Considering the fact that more than 281 million people were affected by cyber-threads in 2021 with an estimated financial impact of more than $15.680 million, the research for security mechanisms for better services has risen significantly. One of the most active trends in cybersecurity offensive procedures is perimeter breaching. This represents the incipient step that attackers take when they target external networks. On average the penetration of the internal networks takes no more than two days, therefore, the defense mechanisms should comply with this hard deadline. Therefore, in this paper, we propose a real-time approach that solves the privacy issues posed by network protocol profiling and surveillance. This can be done by disguising the generated traffic using different transport protocols like chat or gaming services. In order to choose the right channels which can be used, we identified the most prominent ones like Extensible Messaging and Presence Protocol (XMPP) or Internet Relay Chat (IRC) chat and the AllJoyn network, a service used mainly for multiplayer communication in gaming environments on mobile terminals. We evaluate the proposed solution considering metrics such as time frame, speed, and rate limiting delay.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RoEduNet57163.2022.9920974","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The cybersecurity landscape in the last years has evolved significantly. Considering the fact that more than 281 million people were affected by cyber-threads in 2021 with an estimated financial impact of more than $15.680 million, the research for security mechanisms for better services has risen significantly. One of the most active trends in cybersecurity offensive procedures is perimeter breaching. This represents the incipient step that attackers take when they target external networks. On average the penetration of the internal networks takes no more than two days, therefore, the defense mechanisms should comply with this hard deadline. Therefore, in this paper, we propose a real-time approach that solves the privacy issues posed by network protocol profiling and surveillance. This can be done by disguising the generated traffic using different transport protocols like chat or gaming services. In order to choose the right channels which can be used, we identified the most prominent ones like Extensible Messaging and Presence Protocol (XMPP) or Internet Relay Chat (IRC) chat and the AllJoyn network, a service used mainly for multiplayer communication in gaming environments on mobile terminals. We evaluate the proposed solution considering metrics such as time frame, speed, and rate limiting delay.
隐藏云网络访问模式以增强隐私
过去几年,网络安全形势发生了重大变化。考虑到2021年有超过2.81亿人受到网络线程的影响,估计经济影响超过1568万美元,因此对更好服务的安全机制的研究大幅增加。网络安全攻击程序中最活跃的趋势之一是突破边界。这代表了攻击者在攻击外部网络时所采取的第一步。平均而言,内部网络的渗透不超过两天,因此,防御机制应该遵守这个严格的最后期限。因此,在本文中,我们提出了一种实时方法来解决网络协议分析和监视所带来的隐私问题。这可以通过使用不同的传输协议(如聊天或游戏服务)来伪装生成的流量来实现。为了选择可以使用的正确通道,我们确定了最突出的通道,如可扩展消息传递和存在协议(XMPP)或互联网中继聊天(IRC)聊天和AllJoyn网络,这是一种在移动终端游戏环境中主要用于多人通信的服务。我们考虑诸如时间框架、速度和速率限制延迟等指标来评估所提出的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信