Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. 9th EAI International Conference, CloudComp 2019, and 4th EAI International Conference, SmartGIFT 2019, Beijing, China, December 4-5, 2019, and December 21-22, 2019

Research Article

Review of Research on Network Flow Watermarking Techniques

Download
67 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-48513-9_41,
        author={Hui Chen and Qianmu Li and Shunmei Meng and Haiyuan Shen and Kunjin Liu and Huaqiu Long},
        title={Review of Research on Network Flow Watermarking Techniques},
        proceedings={Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. 9th EAI International Conference, CloudComp 2019, and 4th EAI International Conference, SmartGIFT 2019, Beijing, China, December 4-5, 2019, and December 21-22, 2019},
        proceedings_a={CLOUDCOMP},
        year={2020},
        month={6},
        keywords={Network flow watermarking technology Intra-domain tracking Threats to network flow watermarking},
        doi={10.1007/978-3-030-48513-9_41}
    }
    
  • Hui Chen
    Qianmu Li
    Shunmei Meng
    Haiyuan Shen
    Kunjin Liu
    Huaqiu Long
    Year: 2020
    Review of Research on Network Flow Watermarking Techniques
    CLOUDCOMP
    Springer
    DOI: 10.1007/978-3-030-48513-9_41
Hui Chen, Qianmu Li,*, Shunmei Meng, Haiyuan Shen, Kunjin Liu, Huaqiu Long1
  • 1: Wuyi University
*Contact email: qianmu@njust.edu.cn

Abstract

In cloud environment, a framework for cross-domain collaborative tracking could find intruders hidden behind autonomous domains by linking these autonomous domains effectively. The autonomous domain in framework could select the appropriate intrusion tracking technology to implement intra-domain tracking according to its own operating rules and communication characteristics. As an active traffic analysis technology, network flow watermarking technology could accurately locate the real positions of intruders hidden behind intermediate hosts (stepping stones) and anonymous communication systems. Furthermore, it has many advantages such as high precise rate, low false alarm rate, short observation time and so on. For these advantages and its high efficiency of intra-domain tracking, it has become the hot spot in academe research in recent years. Therefore, this paper did the following work: (1) research on network flow watermarking technology; (2) conclude the implementation framework of network flow watermarking technology; (3) analyze the principles and implementation processes of several mainstream network flow watermarking schemes; (4) analyze threats to network flow watermarking.