Traffic Flow Security - Earlier in this chapter, we listed threats, including a threat of traffic flow inference.
- If the attacker can detect an exceptional volume of traffic between two points, the attacker may infer the location of an event about to occur.
- The countermeasure to traffic flow threats is to disguise the traffic flow
- ensure a steady volume of traffic between two points
- pad the traffic stream with many spurious packets
- A more sophisticated approach to traffic flow security is called onion routing
- A wants to send a message to B but doesn't want anyone in or intercepting traffic on the network to know A is communicating with B
Do'stlaringiz bilan baham: |