Research Article
Review of Research on Network Flow Watermarking Techniques
@INPROCEEDINGS{10.1007/978-3-030-48513-9_41, author={Hui Chen and Qianmu Li and Shunmei Meng and Haiyuan Shen and Kunjin Liu and Huaqiu Long}, title={Review of Research on Network Flow Watermarking Techniques}, proceedings={Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. 9th EAI International Conference, CloudComp 2019, and 4th EAI International Conference, SmartGIFT 2019, Beijing, China, December 4-5, 2019, and December 21-22, 2019}, proceedings_a={CLOUDCOMP}, year={2020}, month={6}, keywords={Network flow watermarking technology Intra-domain tracking Threats to network flow watermarking}, doi={10.1007/978-3-030-48513-9_41} }
- Hui Chen
Qianmu Li
Shunmei Meng
Haiyuan Shen
Kunjin Liu
Huaqiu Long
Year: 2020
Review of Research on Network Flow Watermarking Techniques
CLOUDCOMP
Springer
DOI: 10.1007/978-3-030-48513-9_41
Abstract
In cloud environment, a framework for cross-domain collaborative tracking could find intruders hidden behind autonomous domains by linking these autonomous domains effectively. The autonomous domain in framework could select the appropriate intrusion tracking technology to implement intra-domain tracking according to its own operating rules and communication characteristics. As an active traffic analysis technology, network flow watermarking technology could accurately locate the real positions of intruders hidden behind intermediate hosts (stepping stones) and anonymous communication systems. Furthermore, it has many advantages such as high precise rate, low false alarm rate, short observation time and so on. For these advantages and its high efficiency of intra-domain tracking, it has become the hot spot in academe research in recent years. Therefore, this paper did the following work: (1) research on network flow watermarking technology; (2) conclude the implementation framework of network flow watermarking technology; (3) analyze the principles and implementation processes of several mainstream network flow watermarking schemes; (4) analyze threats to network flow watermarking.