Int J Performability Eng ›› 2012, Vol. 8 ›› Issue (2): 173-182.doi: 10.23940/ijpe.12.2.p173.mag
• Original articles • Previous Articles Next Articles
XIAN PAN1, JUNWEI HUANG1, ZHEN LING2, BIN LU3, and XINWEN FU1
Abstract:
Cyber criminals may abuse open wireless networks or those with weak encryption for cyber crimes. To locate such criminals, law enforcement has to first identify which mobile (MAC) is generating suspect traffic behind a wireless router. The challenge is how to correlate the private wireless traffic and the identified suspect public traffic on the Internet. In this paper, we propose a new technique called long Pseudo-Noise (PN) code based Direct Sequence Spread Spectrum (DSSS) flow marking technique for invisibly tracing suspect anonymous wireless flows. In this technique, a long PN code is shared by two investigators, interferer and sniffer. Different bits of the signal will be encoded with different segments of the long PN code. By interfering with a sender's traffic and marginally varying its rate, interferer can embed a secret spread spectrum signal into the sender's traffic. By tracing where the embedded signal goes, sniffer can trace the sender and receiver of the suspect flow despite the use of anonymous encrypted wireless networks. Traffic embedded with long PN code modulated watermarks is much harder to detect. We have conducted extensive analysis and experiments to show the effectiveness of this new technique. We are able to prove that existing detection approaches cannot detect the long PN code modulated traffic. The technique is generic and has broad usage.
XIAN PAN, JUNWEI HUANG, ZHEN LING, BIN LU, and XINWEN FU. Long PN Code Based Traceback in Wireless Networks [J]. Int J Performability Eng, 2012, 8(2): 173-182.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
/ / Recommend
URL: https://www.ijpe-online.com/EN/10.23940/ijpe.12.2.p173.mag
https://www.ijpe-online.com/EN/Y2012/V8/I2/173