skip to main content
10.1145/283699.283748acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free Access

A security model for dynamic adaptive traffic masking

Authors Info & Claims
Published:01 January 1998Publication History
First page image

References

  1. Bad90.Lee Badger, Providing a tlexible security override for trusted systems, in Proceedings of Computer Security Foundations, Workshop Ill; Eranconia, NH, June 1990.Google ScholarGoogle Scholar
  2. Bar64.Paul Bara.n. On distributed communications, vol ix. In Security Secrecy a'rtd Tamper Free Consideral:ions, Memo .t~M-3765-PI?. Ra.nd Corp., Santa Monica, CA, August i964.Google ScholarGoogle Scholar
  3. Bro94.Randy Browne. Mode Security: An infrastructure for covert chanllel suppression. In Proceedin9s of the IEk,'E Symposium on Rcsca'rch in Security and Privacy, Oakland, CA, M~y 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Fra94.Jercmy li'ra.nk. Machine learning and intrusion detectim~: Curre~lt a.nd future directions. I~, P~oceedings of the 17th National Computer Security Conference, October 1994.Google ScholarGoogle Scholar
  5. Gas88.Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold Company, New York, NY, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. GRS96.D.M. Cloldschlag, M.C,. Reed, and P.F. Syverson. Hiding routing information. In Workshop on Information Hiding, Cambridge, UK, May 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. HW89.M.P. Herlihy and J.M. Wing. Specifying security constraAnts with relaxation lattices. In Proceedings of Computer Security Fou'r~dations Workshop ll, Vranconia, NH, June 1989.Google ScholarGoogle ScholarCross RefCross Ref
  8. ISO84.ISO. information Process Systems- Open System Interconnection - Basic Reference Model- IS() 7498. American National Standards Association, Inc., New York, NY, 1984.Google ScholarGoogle Scholar
  9. ISO88.ISO. Information Process Systems- Open System Interconnection Proposed Draft Addendum 2 ISO 7498. American National Standards Association, Inc., New York, NY, .1988.Google ScholarGoogle Scholar
  10. ISO92.ISO. ISO/IEC JTC1/SC6, Network Layer Security Protocol. ISO-IEC DIS 11577 International Standa.rds Organisation, November 29 1992.Google ScholarGoogle Scholar
  11. JV91.ttarold R. Javitz ~nd Alfonso Valdes. The SRI IDES statistical anomaly detector. In Proceedings of the lEER Symposiurr~ on Research in Security and Privacy, Oakland, CA, April 1991.Google ScholarGoogle Scholar
  12. KM93.Myong t i. i(ang and Ira S. Moskowitz. A pump tot rapid, reliable, secure communication. In Proceedings of the A CM Conference on Computer and Communication Security, Fairfax, VA, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. KML95.Myong {I. B:ang, Ira S. Moskowitz, and Daniel C. Lee. A network version of the pump. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. KML96.Myong t l. Kang, IrzL S. Moskowitz, and Daniel C. Lee. A network pump. IEEE Transaction on Software Enginecri~9, 22(5), May 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mac93.Betty Ma,ckman. Reorganized N LSP. DRA/CIS/(SIV_;2)/l~M/93/.3/1, Defence Research Agency, March 1993.Google ScholarGoogle Scholar
  16. McL90.John McLean. Security models and information flow. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1990.Google ScholarGoogle ScholarCross RefCross Ref
  17. MK94.Ira S. Moskowitz and Myong ft. Kang. Covert channels - here to stay? In Proceedings of COM- PASS '9/t, Gaithersburg, MD, June 27- July 1 1994. IEBE Press.Google ScholarGoogle Scholar
  18. NWV91.R. E. Newman-Wolfe a.nd B. R. Venkatraman. itigh level prevention of traffic analysis. In Scvcr~th Annual Computer Security Applications Co'nferc'nce, San Antonio, Texas, December 1991.Google ScholarGoogle Scholar
  19. Ram90.Raju Ramaswamy. Traffic flow confidentiality security service in OSI computer network architecture. In Proceedings of the IEEE Region 10 Conference on Computer and Communication Systems, Hong Kong, September 1990.Google ScholarGoogle ScholarCross RefCross Ref
  20. RS93.Charles Rackoff ~nd Daniel R. Simon. Cryptographic defense against traffic analysis. In Proceedings of the 25th Annual Symposium on the Theory of Computing, CA, USA, May 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Ven94.B. Venkatraman. Prevention of Traffic Analysis and Associated Covert Channels. PhD thesis, University of Florida, Gainsville, Florida, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. VK83.V.L. Voydock ~nd S. T. Kent. Security mechanisms in high-level network protocols. A CM Cornputing Surveys, 15(3), June 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Web88.Douglas Weber. Security policies for army tactical C2 systems. Technical report, Odyssey Research Associates, Inc., Ithaca, NY, 1988.Google ScholarGoogle Scholar

Index Terms

  1. A security model for dynamic adaptive traffic masking

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    NSPW '97: Proceedings of the 1997 workshop on New security paradigms
                    January 1998
                    122 pages
                    ISBN:0897919866
                    DOI:10.1145/283699

                    Copyright © 1998 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 January 1998

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • Article

                    Acceptance Rates

                    Overall Acceptance Rate62of170submissions,36%

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader