TY - JOUR
T1 - Multiple redundant flow fingerprint model based on time slots
AU - Liu, Kexian
AU - Guan, Jianfeng
AU - Zhang, Wancheng
AU - He, Zhikai
AU - Yan, Dijia
N1 - Publisher Copyright:
© 2023, Beijing Xintong Media Co., Ltd.. All rights reserved.
PY - 2023/2/25
Y1 - 2023/2/25
N2 - With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks. The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and se-curity. In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism. The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations. Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered. Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed. The analytical results show that the robustness of the fingerprint model im-proves with increasing redundant bits when the packet distribution in the network stream is given. Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated. The experimental result show that the model has high robustness. Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.
AB - With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks. The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and se-curity. In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism. The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations. Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered. Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed. The analytical results show that the robustness of the fingerprint model im-proves with increasing redundant bits when the packet distribution in the network stream is given. Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated. The experimental result show that the model has high robustness. Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.
KW - endogenous safety and security
KW - flow fingerprint
KW - flow watermark
KW - multiple redundancy
UR - http://www.scopus.com/inward/record.url?scp=85152960508&partnerID=8YFLogxK
U2 - 10.11959/j.issn.2096-109x.2023006
DO - 10.11959/j.issn.2096-109x.2023006
M3 - Article
AN - SCOPUS:85152960508
SN - 2096-109X
VL - 9
SP - 115
EP - 129
JO - Chinese Journal of Network and Information Security
JF - Chinese Journal of Network and Information Security
IS - 1
ER -