{"title":"High level prevention of traffic analysis","authors":"R. Newman, B. Venkatraman","doi":"10.1109/CSAC.1991.213014","DOIUrl":null,"url":null,"abstract":"The paper gives a mathematical model for prevention of traffic analysis in network security and suggests an approach for prevention of unauthorized release of information concerning traffic patterns. The model assumes that an eavesdropper may read the contents of all links, including the source and destination, and that all countermeasures are performed at the transport layer. The goal of the countermeasures is to prevent the eavesdropper from gaining any useful information regarding the traffic patterns in a cost efficient and feasible manner. Countermeasures performed at the transport level include encryption a limited form of message rerouting delaying messages and sending dummy messages as needed within resource capacities. By formulating the problem in terms of systems of equalities and systems of inequalities linear programming methods may be used to find solutions to the traffic analysis security problem.<<ETX>>","PeriodicalId":108621,"journal":{"name":"Proceedings Seventh Annual Computer Security Applications Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"49","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Seventh Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1991.213014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 49
Abstract
The paper gives a mathematical model for prevention of traffic analysis in network security and suggests an approach for prevention of unauthorized release of information concerning traffic patterns. The model assumes that an eavesdropper may read the contents of all links, including the source and destination, and that all countermeasures are performed at the transport layer. The goal of the countermeasures is to prevent the eavesdropper from gaining any useful information regarding the traffic patterns in a cost efficient and feasible manner. Countermeasures performed at the transport level include encryption a limited form of message rerouting delaying messages and sending dummy messages as needed within resource capacities. By formulating the problem in terms of systems of equalities and systems of inequalities linear programming methods may be used to find solutions to the traffic analysis security problem.<>