A. K. International Journal of Innovative Science and Modern Engineering (IJISME), 2 (5):
33-36(April 2014)
Abstract
This paper focuses on the active watermarking technique, which has been active in the past few years. This paper proposes a flow-marking scheme based on the direct sequence spread spectrum technique by utilizing a pseudo-noise code. By interfering with the rate of a suspect sender’s traffic and marginally changing the traffic rate, the attacker can embed a secret spread-spectrum signal into the target traffic. The embedded signal is carried along with the target traffic from the sender to the receiver, so the investigator can recognize the corresponding communication relationship, tracing the messages despite the use of anonymous networks. However, in order to accurately confirm the anonymous communication relationship of users, the flow-marking scheme needs to embed a signal modulated by a relatively long length of PN code, and also the signal is embedded into the traffic flow rate variation. After the signal is embedded and delay is added between cells, we gone generate Mimo graph, it gives the probability of how much data is been extracted.
%0 Journal Article
%1 noauthororeditor
%A K, Akshatha Prabhu
%D 2014
%E Kumar, Dr. Shiv
%J International Journal of Innovative Science and Modern Engineering (IJISME)
%K TOR against attack
%N 5
%P 33-36
%T Attack against Anonymous Network
%U https://www.ijisme.org/wp-content/uploads/papers/v2i5/E0645042514.pdf
%V 2
%X This paper focuses on the active watermarking technique, which has been active in the past few years. This paper proposes a flow-marking scheme based on the direct sequence spread spectrum technique by utilizing a pseudo-noise code. By interfering with the rate of a suspect sender’s traffic and marginally changing the traffic rate, the attacker can embed a secret spread-spectrum signal into the target traffic. The embedded signal is carried along with the target traffic from the sender to the receiver, so the investigator can recognize the corresponding communication relationship, tracing the messages despite the use of anonymous networks. However, in order to accurately confirm the anonymous communication relationship of users, the flow-marking scheme needs to embed a signal modulated by a relatively long length of PN code, and also the signal is embedded into the traffic flow rate variation. After the signal is embedded and delay is added between cells, we gone generate Mimo graph, it gives the probability of how much data is been extracted.
@article{noauthororeditor,
abstract = {This paper focuses on the active watermarking technique, which has been active in the past few years. This paper proposes a flow-marking scheme based on the direct sequence spread spectrum technique by utilizing a pseudo-noise code. By interfering with the rate of a suspect sender’s traffic and marginally changing the traffic rate, the attacker can embed a secret spread-spectrum signal into the target traffic. The embedded signal is carried along with the target traffic from the sender to the receiver, so the investigator can recognize the corresponding communication relationship, tracing the messages despite the use of anonymous networks. However, in order to accurately confirm the anonymous communication relationship of users, the flow-marking scheme needs to embed a signal modulated by a relatively long length of PN code, and also the signal is embedded into the traffic flow rate variation. After the signal is embedded and delay is added between cells, we gone generate Mimo graph, it gives the probability of how much data is been extracted.},
added-at = {2021-09-21T12:46:15.000+0200},
author = {K, Akshatha Prabhu},
biburl = {https://www.bibsonomy.org/bibtex/2d6c112e1e860fef117a8b3300215cf38/ijisme_beiesp},
editor = {Kumar, Dr. Shiv},
interhash = {4a60ea806a301fafab1a718013f39baf},
intrahash = {d6c112e1e860fef117a8b3300215cf38},
issn = {2319-6386},
journal = {International Journal of Innovative Science and Modern Engineering (IJISME)},
keywords = {TOR against attack},
language = {En},
month = {April},
number = 5,
pages = {33-36},
timestamp = {2021-09-21T12:46:15.000+0200},
title = {Attack against Anonymous Network},
url = {https://www.ijisme.org/wp-content/uploads/papers/v2i5/E0645042514.pdf},
volume = 2,
year = 2014
}