Volume : 2, Issue : 4, April - 2013

Interpacket Delay Analysis Scheme for Encrypted Attack Traffic

Anandakumar. H, Lekhaa. T. R

Abstract :

Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate nodes. Chain of compromised hosts acting as “stepping stones”. Attack detection system detects stepping–stone connections at the compromised hosts. Encryption and perturbation methods are used to increase the complexity of the detection systems. The survey is carried out under Stepping stone analysis, Encrypted packet analysis, Time perturbation model and Inter Packet Delay analysis model. The stepping stone analysis is performed to detect attacks. The encrypted packet analysis is carried out to detect attacks with encrypted packets. Time perturbation analysis is done to detect packet attacks with time changes. Inter packet delay based analysis is performed to detect attacks with packet delay values.

Keywords :


Cite This Article:

Anandakumar.H,Lekhaa.T. R Interpacket Delay Analysis Scheme for Encrypted Attack Traffic Global Journal For Research Analysis, Vol:II, Issue:IV April 2013


Article No. : 1


Number of Downloads : 1


References :