Obfuscation of critical infrastructure network traffic using fake communication

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The tendency in cyber attacks has evolved from ones immediately causing abnormal operations to advanced attacks after information extraction by traffic sniffing. In particular, the unchanging characteristics of CIS networks are more susceptible to advanced attacks through information extraction. In this paper, we suggest the concept of an obfuscation method for CIS network traffic to interfere with information extraction. We investigated the characteristics of CIS traffic as found from real data. Based on our observations, we propose a method of creating fake communication to make the best use of surplus network bandwidth. We show that our method can vary the characteristics of a CIS network to prevent information extraction by sniffing.

Cite

CITATION STYLE

APA

Jeon, S., Yun, J. H., & Kim, W. N. (2016). Obfuscation of critical infrastructure network traffic using fake communication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8985, pp. 268–274). Springer Verlag. https://doi.org/10.1007/978-3-319-31664-2_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free