Abstract
AbstractData in transit, or network traffic, can be eavesdropped on and potentially leak sensitive information. This information can be in the payload, headers, or metadata. To mitigate this, many communication protocols encrypt traffic on different layers exist. However, even if encrypted traffic leaks information through its metadata. The percentage of encrypted network traffic has risen continuously in the past years, and we expect this trend to continue in the following years. On the other hand, measures to protect metadata are limited, leaving network traffic vulnerable to traffic-analysis attacks.
Publisher
Springer Nature Switzerland
Reference12 articles.
1. 802.1AE: MAC Security (MACsec) 1.ieee802.org. https://1.ieee802.org/security/802-1ae/. [Accessed 04-Nov-2022].
2. RFC 4301: Security Architecture for the Internet Protocol – rfc-editor.org. https://www.rfc-editor.org/rfc/rfc4301. [Accessed 04-Nov-2022].
3. RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3 — rfc-editor.org. https://www.rfc-editor.org/rfc/rfc8446. [Accessed 04-Nov-2022].
4. Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, and Thomas Shrimpton. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In 2012 IEEE Symposium on Security and Privacy, pages 332–346, 2012.
5. Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Bryan Ford, Jean-Pierre Hubaux, and Joan Feigenbaum. Prifi: A low-latency local-area anonymous communication network. arXiv preprint arXiv:1710.10237, 2017.