CAPEC 621 Analysis of Packet Timing and Sizes

Draft Detailed Unknown Risk
Severity Low

Description

An attacker may intercept and log encrypted transmissions for the purpose of analyzing metadata such as packet timing and sizes. Although the actual data may be encrypted, this metadata may reveal valuable information to an attacker. Note that this attack is applicable to VOIP data as well as application data, especially for interactive apps that require precise timing and low-latency (e.g. thin-clients).

Mitigations

1

Consequences

Relationships