This paper analyzes the problem of intercepting Internet traffic from the eavesdropper's point of view. It examines the reliability and accuracy of transcripts, and shows that obtaining "high fidelity" transcripts is harder than previously assumed. Even in highly favorable situations, such as capturing unencrypted traffic using standard protocols, simple - and entirely unilateral - countermeasures are shown to be sufficient to prevent accurate traffic analysis in many Internet interception configurations. In particular, these countermeasures were successful against every available eavesdropping system we tested. Central to our approach is a new class of " confusion" techniques, that unlike cryptography or stcganography, do not require cooperation by the communicating parties and, in some cases, can be employed entirely by a third party who is not involved in the communication.
CITATION STYLE
Cronin, E., Sherr, M., & Blaze, M. (2006). On the reliability of network eavesdropping tools. IFIP International Federation for Information Processing, 222, 199–213. https://doi.org/10.1007/0-387-36891-4_16
Mendeley helps you to discover research relevant for your work.