{"title":"DeMarking: A defense for network flow watermarking in real-time","authors":"Yali Yuan, Jian Ge, Guang Cheng","doi":"10.1016/j.cose.2025.104355","DOIUrl":null,"url":null,"abstract":"<div><div>The network flow watermarking technique associates the two communicating parties by actively modifying certain characteristics of the flow generated by the sender so that it covertly carries some special marking information. Some third-party attackers communicating with the hidden server as a Tor client may attempt de-anonymization attacks to uncover the real identity of the hidden server by using this technique. This compromises the privacy of the anonymized communication system. Therefore, we propose a watermark defense scheme based on deep neural networks. Firstly, we design a training architecture based on generative adversarial networks and adversarial attacks. This architecture can train a converter to convert the original Inter-Packet Delays (IPD) into newly generated “clean” IPDs by the model, causing the adversary’s detector to extract incorrect information and thus unable to perform traffic correlation. Using the trained converter model, we design a watermark defense scheme that can effectively resist time-based watermarking techniques.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"152 ","pages":"Article 104355"},"PeriodicalIF":4.8000,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825000446","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The network flow watermarking technique associates the two communicating parties by actively modifying certain characteristics of the flow generated by the sender so that it covertly carries some special marking information. Some third-party attackers communicating with the hidden server as a Tor client may attempt de-anonymization attacks to uncover the real identity of the hidden server by using this technique. This compromises the privacy of the anonymized communication system. Therefore, we propose a watermark defense scheme based on deep neural networks. Firstly, we design a training architecture based on generative adversarial networks and adversarial attacks. This architecture can train a converter to convert the original Inter-Packet Delays (IPD) into newly generated “clean” IPDs by the model, causing the adversary’s detector to extract incorrect information and thus unable to perform traffic correlation. Using the trained converter model, we design a watermark defense scheme that can effectively resist time-based watermarking techniques.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.