Introducing Traffic Analysis

نویسنده

  • George Danezis
چکیده

In the Second World War, traffic analysis was used by the British at Bletchley Park to assess the size of Germany’s air-force, and Japanese traffic analysis countermeasures contributed to the surprise of their 1941 attack on Pearl Harbour. Nowadays, Google uses the incidence of links to assess the relative importance of web pages, credit card companies examine transactions to spot fraudulent patterns of spending, and amateur plane-spotters revealed the CIA’s ‘extraordinary rendition’ programme. Diffie and Landau, in their book on wiretapping, went so far as to say that “traffic analysis, not cryptanalysis, is the backbone of communications intelligence” [1]. However, until recently the topic has been neglected by Computer Science academics. A rich literature discusses how to secure the confidentiality, integrity and availability of communication content, but very little work has considered the information leaked from communications ‘traffic data’ and how these compromises might be minimised. Traffic data records the time and duration of a communication, and traffic analysis examines this data to determine the detailed shape of the communication streams, the identities of the parties communicating, and what can be established about their locations. The data may even be sketchy or incomplete – simply knowing what ‘typical’ communication patterns look like can be used to infer information about a particular observed communication. Civilian infrastructures, on which state and economic actors are increasingly reliant, are ever more vulnerable to traffic analysis: wireless and GSM telephony are replacing traditional systems, routing is transparent and protocols are overlaid over others – giving plenty of opportunity to observe, and take advantage of the traffic data. Concretely, an attacker can make use of this

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Third-order Decentralized Safe Consensus Protocol for Inter-connected Heterogeneous Vehicular Platoons

In this paper, the stability analysis and control design of heterogeneous traffic flow is considered. It is assumed that the traffic flow consists of infinite number of cooperative non-identical vehicular platoons. Two different networks are investigated in stability analysis of heterogeneous traffic flow: 1) inter-platoon network which deals with the communication topology of lead vehicles and...

متن کامل

Attitudes of Iranians toward the Becker Proposition

This paper evaluates attitudes of Iranians toward crossing red traffic lights and their sensitivity to fines. Economic theory of crime under expected utility predicts that because of the possibility of severe punishments, risk adverse individuals would not cross red lights. This is implied by the Becker proposition. However, among 262 individuals surveyed, more than half of the sample has previ...

متن کامل

Revisiting the Markov Chain Model of IEEE 802.11E EDCA and Introducing the Virtual Collision Phenomenon

IEEE 802.11e specifies the Enhanced Distributed Channel Access (EDCA) for distributed access with traffic differentiation to a Wireless Local Area Network (WLAN). Traffic differentiation led to introducing several traffic queues within each station, thus introducing virtual collision. In this paper, we present a pattern based Markov chain model of EDCA including the virtual collision phenomenon...

متن کامل

The Study of DEA Evaluating Model on Road Traffic Safety

Abstract—Data Envelopment Analysis is a kind of important analyzing tool and research method in evaluation. As a method, introducing secondary relative evaluation method, the Data Envelopment Analysis (DEA) is applied to evaluate road traffic safety in different areas based on optimizing evaluation index system. This paper mostly discusses the relatively safety of different areas. Keywords—road...

متن کامل

Representing a method to identify and contrast with the fraud which is created by robots for developing websites’ traffic ranking

With the expansion of the Internet and the Web, communication and information gathering between individual has distracted from its traditional form and into web sites. The World Wide Web also offers a great opportunity for businesses to improve their relationship with the client and expand their marketplace in online world. Businesses use a criterion called traffic ranking to determine their si...

متن کامل

Analysis of IP Prefix Hijacking and Traffic Interception

In the Internet, BGP is de facto inter-domain routing protocol. And it is vulnerable to a number of damaging attacks. Among these attacks, IP prefix hijacking and traffic interception are regarded as the serious threats in the Internet. There have been many incidents of IP prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic by introducing network unreachability...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005