Next: Policy Routing of Multicast
Up: Network level solutions
Previous: Firewalls
Traffic analysis is a potential problem. If both company A and company
B are in the same encrypted multicast session, the fact that they are
talking to each other may leak valuable information. To prevent this,
trusted service providers may provide anonymous redistribution, using
address mappings to prevent eavesdroppers from easily determining
origin. In order to make traffic analysis more difficult, extra bogus
traffic can be generated from the redistribution centre to hide the
actual traffic patterns.
Jon CROWCROFT
1998-12-03