Wednesday, 20 March 2013

Traffic Confidentiality


7.2. Traffic Confidentiality

We mentioned in Chapter 1 that, in some cases, users are concerned about security from traffic analysis. Knowledge about the number and length of messages between nodes may enable an opponent to determine who is talking to whom. This can have obvious implications in a military conflict. Even in commercial applications, traffic analysis may yield information that the traffic generators would like to conceal. [MUFT89] lists the following types of information that can be derived from a traffic analysis attack:
  • Identities of partners
  • How frequently the partners are communicating
  • Message pattern, message length, or quantity of messages that suggest important information is being exchanged
  • The events that correlate with special conversations between particular partners
Another concern related to traffic is the use of traffic patterns to create a covert channel. A covert channel is a means of communication in a fashion unintended by the designers of the communications facility. Typically, the channel is used to transfer information in a way that violates a security policy. For example, an employee may wish to communicate information to an outsider in a way that is not detected by management and that requires simple eavesdropping on the part of the outsider. The two participants could set up a code in which an apparently legitimate message of a less than a certain length represents binary zero, whereas a longer message represents a binary one. Other such schemes are possible.

3 comments:

  1. Am very gald to thiz topic

    ReplyDelete
  2. I would like to say that this blog really convinced me to do it! Thanks, very good post. drink driving lawyer

    ReplyDelete
  3. Sciensity: Traffic Confidentiality >>>>> Download Now

    >>>>> Download Full

    Sciensity: Traffic Confidentiality >>>>> Download LINK

    >>>>> Download Now

    Sciensity: Traffic Confidentiality >>>>> Download Full

    >>>>> Download LINK LO

    ReplyDelete