System and method for evaluating and enhancing source anonymity for encrypted web traffic

a source anonymity and encrypted web technology, applied in the field of communication, can solve problems such as embarrassment and/or financial detriments, compromising safety, and inadvertent disclosure of browsing user's location or other types of personal information, and achieve the effect of reducing the uniqueness of the traffic signatur

Inactive Publication Date: 2006-03-16
MICROSOFT TECH LICENSING LLC
View PDF29 Cites 118 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0008] The present invention also provides various ways to make it more difficult to identify the source of the encrypted Web traffic based on statistical matching of traffic signatures of the encrypted Web traffic. The countermeasures generally include three types of traffic-shaping schemes: padding, mimicking, and morphing. In particular, countermeasures including exponential padding of object sizes, padding by adding objects, mimicking other Web pages, random blocking of Web advertisement objects, and using multiple browsers to fetch randomly selected Web pages at the same time to mix objects of various Web pages in the traffic, can be used to modify the pattern of encrypted Web traffic for a Web page to reduce the uniqueness of the traffic signature.

Problems solved by technology

Protecting communication privacy is an important issue for all types of electronic communication, especially when the communication data are sent over a large network, such as the Internet, where an adverse party can easily intercept the communication data.
The recent rise of the World Wide Web on the Internet has triggered serious concerns about the possible threats to privacy associated with Web browsing.
The browsing user's location or other types of personal information may be inadvertently disclosed if the communication data traffic is intercepted by an adverse observer.
Even partial revelation of such information can cause embarrassment and / or financial detriments or even compromise safety.
For instance, a user found to be browsing Web pages containing certain types of medical or financial information may inadvertently reveal, through implied interest in that information, embarrassing or confidential financial information about himself.
As another example, a user may reveal that he is out of town, thereby making his home vulnerable to burglary, simply by accessing a private home security Web server from abroad.
Even with the combination of data encryption and using intermediate proxies, Web traffic anonymity is still not guaranteed.
Generally, even when multiple proxies are used, the first link on the routing chain (i.e., the link between the user and the first proxy) is the most vulnerable to attack, since an attacker (which may be the first proxy itself, the user's ISP, or perhaps an eavesdropper, especially on a wireless link) can immediately determine the user's network address.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for evaluating and enhancing source anonymity for encrypted web traffic
  • System and method for evaluating and enhancing source anonymity for encrypted web traffic
  • System and method for evaluating and enhancing source anonymity for encrypted web traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Turning to the drawings, wherein like reference numerals refer to like elements, the invention is illustrated as being implemented in a suitable computing environment. Although not required, the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by a personal computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. The invention may be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.

Description

TECHNICAL FIELD OF THE INVENTION [0001] This invention relates generally to communications over a computer network, and more particularly to the evaluation of the vulnerability of Web traffic to attempts to identify the sources of the Web traffic, and to the provision of effective countermeasures against such privacy attacks. BACKGROUND OF THE INVENTION [0002] Protecting communication privacy is an important issue for all types of electronic communication, especially when the communication data are sent over a large network, such as the Internet, where an adverse party can easily intercept the communication data. The recent rise of the World Wide Web on the Internet has triggered serious concerns about the possible threats to privacy associated with Web browsing. The browsing user's location or other types of personal information may be inadvertently disclosed if the communication data traffic is intercepted by an adverse observer. Even partial revelation of such information can cau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00H04L29/06
CPCG06F2221/2107G06F2221/2119G06Q20/10H04L63/1408G06Q20/1085G06Q20/40H04L63/0407G06Q20/102
Inventor WANG, YI-MINSUN, QIXIANGSIMON, DANIEL R.RUSSELL, WILFREDQIU, LILIPADMANABHAN, VENKATA N.
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products