{"title":"通过缓存行为推断混合网络中的军事活动","authors":"Mostafa Dehghan, D. Goeckel, T. He, D. Towsley","doi":"10.1109/MILCOM.2013.292","DOIUrl":null,"url":null,"abstract":"In this work, we consider a tactical hybrid network where a military adhoc network utilizes a commercial cellular network as backbone for data traffic. It is assumed that all traffic goes through a cache at the cellular base station with Least-Recently Used (LRU) policy. We study the possibility of inferring the military traffic rate from cache hit/miss observations of a single adversary node. We show the possibility of such an inference by presenting algorithms for estimating the parameters of the hybrid network. First, we show that an adversary node can estimate the cache and workload parameters of a hybrid network by observing the hit/miss results of her queries. We then show that these estimates can be used to infer the military traffic rate.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Inferring Military Activity in Hybrid Networks through Cache Behavior\",\"authors\":\"Mostafa Dehghan, D. Goeckel, T. He, D. Towsley\",\"doi\":\"10.1109/MILCOM.2013.292\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, we consider a tactical hybrid network where a military adhoc network utilizes a commercial cellular network as backbone for data traffic. It is assumed that all traffic goes through a cache at the cellular base station with Least-Recently Used (LRU) policy. We study the possibility of inferring the military traffic rate from cache hit/miss observations of a single adversary node. We show the possibility of such an inference by presenting algorithms for estimating the parameters of the hybrid network. First, we show that an adversary node can estimate the cache and workload parameters of a hybrid network by observing the hit/miss results of her queries. We then show that these estimates can be used to infer the military traffic rate.\",\"PeriodicalId\":379382,\"journal\":{\"name\":\"MILCOM 2013 - 2013 IEEE Military Communications Conference\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2013 - 2013 IEEE Military Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2013.292\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2013 - 2013 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2013.292","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Inferring Military Activity in Hybrid Networks through Cache Behavior
In this work, we consider a tactical hybrid network where a military adhoc network utilizes a commercial cellular network as backbone for data traffic. It is assumed that all traffic goes through a cache at the cellular base station with Least-Recently Used (LRU) policy. We study the possibility of inferring the military traffic rate from cache hit/miss observations of a single adversary node. We show the possibility of such an inference by presenting algorithms for estimating the parameters of the hybrid network. First, we show that an adversary node can estimate the cache and workload parameters of a hybrid network by observing the hit/miss results of her queries. We then show that these estimates can be used to infer the military traffic rate.