Distributed Detection of Information Flows in Chaff

Distributed detection of information flows is considered. The detector detects the presence of information flows by collecting timing information from nodes of interest through channels of finite capacity. The information flows are assumed to be perturbed up to a bounded delay and interleaved with chaff. Joint compression and detection schemes are proposed to achieve reliable detection with inaccurate measurements. Detection performance is analytically evaluated by robustness against chaff as functions of the capacity constraints in the data collection. The proposed detectors are proved to be optimal for their corresponding quantizers. A comparison of their performance gives guidelines on quantizer design.

[1]  Bruce Schneier,et al.  Practical cryptography , 2003 .

[2]  Shun-ichi Amari,et al.  Statistical Inference Under Multiterminal Data Compression , 1998, IEEE Trans. Inf. Theory.

[3]  Sergio Verdu,et al.  The exponential distribution in information theory , 1996 .

[4]  Vern Paxson,et al.  Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.

[5]  Izhak Rubin,et al.  Information rates and data-compression schemes for Poisson processes , 1974, IEEE Trans. Inf. Theory.

[6]  Dawn Xiaodong Song,et al.  Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.

[7]  Lang Tong,et al.  Detecting Information Flows: Improving Chaff Tolerance by Joint Detection , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[8]  Peng Ning,et al.  Active timing-based correlation of perturbed traffic flows with chaff packets , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[9]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[10]  Douglas S. Reeves,et al.  Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays , 2003, CCS '03.

[11]  Lang Tong,et al.  Distributed Detection of Information Flows , 2008, IEEE Transactions on Information Forensics and Security.

[12]  Yin Zhang,et al.  Detecting Stepping Stones , 2000, USENIX Security Symposium.