DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace

KwilB5FmGeo/default.jpg

The information security discipline devotes immense resources to developing and protecting a core set of protocols that encode and encrypt Internet communications. However, since the dawn of human conflict, simple Traffic Analysis (TA) has been used to circumvent innumerable security schemes. TA leverages metadata and hard-to-conceal network flow data related to the source, destination, size, frequency, and direction of information, from which eavesdroppers can often deduce a comprehensive intelligence analysis. TA is effective in both the hard and soft sciences, and provides an edge in economic, political, intelligence, and military affairs. Today, modern information technology, including the ubiquity of computers, and the interconnected nature of cyberspace, has made TA a global and universally accessible discipline. Further, due to privacy issues, it is also a global concern. Digital metadata, affordable computer storage, and automated information processing now record and analyse nearly all human activities, and the scrutiny is growing more acute by the day. Corporate, law enforcement, and intelligence agencies have access to strategic datasets from which they can drill down to the tactical level at any moment. This paper discusses the nature of TA, how it has evolved in the Internet era, and demonstrates the power of high-level analysis based on a large cybersecurity dataset.



KwilB5FmGeo/default.jpg
DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace Reviewed by Anonymous on January 13, 2018 Rating: 5