An Intrusion Tracking Watermarking Scheme

With the rapid development of edge computing technology, the scale of the network continues to expand. Various types of applications are becoming more widespread. In the edge computing, existing network agents, NAT, IP tunneling technologies, and rapidly evolving anonymous communication systems prov...

Full description

Bibliographic Details
Main Authors: Jun Hou, Qianmu Li, Rong Tan, Shunmei Meng, Hanrui Zhang, Sainan Zhang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8847298/
id doaj-e420a20efcd44de6b18647a590226cc4
record_format Article
spelling doaj-e420a20efcd44de6b18647a590226cc42021-03-29T23:54:40ZengIEEEIEEE Access2169-35362019-01-01714143814145510.1109/ACCESS.2019.29434938847298An Intrusion Tracking Watermarking SchemeJun Hou0https://orcid.org/0000-0002-6986-4961Qianmu Li1https://orcid.org/0000-0002-0998-1517Rong Tan2Shunmei Meng3https://orcid.org/0000-0002-6173-9787Hanrui Zhang4Sainan Zhang5Nanjing Institute of Industry Technology, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaCollege of Information and Computer Science, Shanghai Business School, Shanghai, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaIntelligent Manufacturing Department, Wuyi University, Jiangmen, ChinaIntelligent Manufacturing Department, Wuyi University, Jiangmen, ChinaWith the rapid development of edge computing technology, the scale of the network continues to expand. Various types of applications are becoming more widespread. In the edge computing, existing network agents, NAT, IP tunneling technologies, and rapidly evolving anonymous communication systems provide convenience for attackers to hide real IP. In addition, the attacker forms a “stepping” chain by breaking through several intermediate systems of the edge computing network. Thereby implementing an invisible intrusion attack across multiple autonomous domains can increase the difficulty of intrusion tracking. Aiming at the problem of insufficient applicability of existing interval centroid based watermarking technique, this paper proposes a histogram specified interval centroid-based watermarking technique. It improves cross-domain collaborative intrusion tracking. This technique improves the resistance of the prior art to multi-flow attacks in edge computing. It decreases the time and space overhead of the detector. Compared with other interval centroid based watermarking techniques, this method has stronger concealment. The proposed method can effectively defend against multi-flow attacks of edge computing. The time and space overhead of the detector can be reduced when multiple attack flows are tracked in parallel. Thus, it is suitable for edge computing. The robustness and adaptability are improved by this method.https://ieeexplore.ieee.org/document/8847298/Edge computingintrusion tracking watermarkingnetwork flow
collection DOAJ
language English
format Article
sources DOAJ
author Jun Hou
Qianmu Li
Rong Tan
Shunmei Meng
Hanrui Zhang
Sainan Zhang
spellingShingle Jun Hou
Qianmu Li
Rong Tan
Shunmei Meng
Hanrui Zhang
Sainan Zhang
An Intrusion Tracking Watermarking Scheme
IEEE Access
Edge computing
intrusion tracking watermarking
network flow
author_facet Jun Hou
Qianmu Li
Rong Tan
Shunmei Meng
Hanrui Zhang
Sainan Zhang
author_sort Jun Hou
title An Intrusion Tracking Watermarking Scheme
title_short An Intrusion Tracking Watermarking Scheme
title_full An Intrusion Tracking Watermarking Scheme
title_fullStr An Intrusion Tracking Watermarking Scheme
title_full_unstemmed An Intrusion Tracking Watermarking Scheme
title_sort intrusion tracking watermarking scheme
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description With the rapid development of edge computing technology, the scale of the network continues to expand. Various types of applications are becoming more widespread. In the edge computing, existing network agents, NAT, IP tunneling technologies, and rapidly evolving anonymous communication systems provide convenience for attackers to hide real IP. In addition, the attacker forms a “stepping” chain by breaking through several intermediate systems of the edge computing network. Thereby implementing an invisible intrusion attack across multiple autonomous domains can increase the difficulty of intrusion tracking. Aiming at the problem of insufficient applicability of existing interval centroid based watermarking technique, this paper proposes a histogram specified interval centroid-based watermarking technique. It improves cross-domain collaborative intrusion tracking. This technique improves the resistance of the prior art to multi-flow attacks in edge computing. It decreases the time and space overhead of the detector. Compared with other interval centroid based watermarking techniques, this method has stronger concealment. The proposed method can effectively defend against multi-flow attacks of edge computing. The time and space overhead of the detector can be reduced when multiple attack flows are tracked in parallel. Thus, it is suitable for edge computing. The robustness and adaptability are improved by this method.
topic Edge computing
intrusion tracking watermarking
network flow
url https://ieeexplore.ieee.org/document/8847298/
work_keys_str_mv AT junhou anintrusiontrackingwatermarkingscheme
AT qianmuli anintrusiontrackingwatermarkingscheme
AT rongtan anintrusiontrackingwatermarkingscheme
AT shunmeimeng anintrusiontrackingwatermarkingscheme
AT hanruizhang anintrusiontrackingwatermarkingscheme
AT sainanzhang anintrusiontrackingwatermarkingscheme
AT junhou intrusiontrackingwatermarkingscheme
AT qianmuli intrusiontrackingwatermarkingscheme
AT rongtan intrusiontrackingwatermarkingscheme
AT shunmeimeng intrusiontrackingwatermarkingscheme
AT hanruizhang intrusiontrackingwatermarkingscheme
AT sainanzhang intrusiontrackingwatermarkingscheme
_version_ 1724188934827671552