Volume : 2, Issue : 4, April - 2013
Interpacket Delay Analysis Scheme for Encrypted Attack Traffic
Anandakumar. H, Lekhaa. T. R
Abstract :
Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate nodes. Chain of compromised hosts acting as “stepping stones”. Attack detection system detects stepping–stone connections at the compromised hosts. Encryption and perturbation methods are used to increase the complexity of the detection systems. The survey is carried out under Stepping stone analysis, Encrypted packet analysis, Time perturbation model and Inter Packet Delay analysis model. The stepping stone analysis is performed to detect attacks. The encrypted packet analysis is carried out to detect attacks with encrypted packets. Time perturbation analysis is done to detect packet attacks with time changes. Inter packet delay based analysis is performed to detect attacks with packet delay values.
Keywords :
Article:
Download PDF Journal DOI : 10.15373/2249555XCite This Article:
Anandakumar.H,Lekhaa.T. R Interpacket Delay Analysis Scheme for Encrypted Attack Traffic Global Journal For Research Analysis, Vol:II, Issue:IV April 2013