Dark Mode

Settings

Capec-621 Detail

Analysis of Packet Timing and Sizes

Detailed Software Physical Security Hardware Typical Severity: Low

Parents: 189

Threats: T60 T291

Description

An attacker may intercept and log encrypted transmissions for the purpose of analyzing metadata such as packet timing and sizes. Although the actual data may be encrypted, this metadata may reveal valuable information to an attacker. Note that this attack is applicable to VOIP data as well as application data, especially for interactive apps that require precise timing and low-latency (e.g. thin-clients).

Not present

External ID Source Link Description
CAPEC-621 capec https://capec.mitre.org/data/definitions/621.html
CWE-201 cwe http://cwe.mitre.org/data/definitions/201.html

Not present

  1. Use of untrusted communication paths enables an attacker to intercept and log communications, including metadata such as packet timing and sizes.

Not present

High
These attacks generally require sophisticated machine learning techniques and require traffic capture as a prerequisite.
Confidentiality
Read Data (Derive sensitive information about encrypted data.)

Not present