Detection of Tor Traffic using Deep Learning

作者: Suleiman Y. Yerima , Debmalya Sarkar , P. Vinod

DOI: 10.1109/AICCSA50499.2020.9316533

关键词: Artificial neural networkEncryptionRobustness (computer science)Artificial intelligenceAnonymityDeep learningRouterMachine learningIntrusion detection systemSupport vector machineComputer science

摘要: Tor, originally known as The Onion Router, is a free software that allows users to communicate anonymously on the Internet. This makes Tor attractive to cyber criminals, and …

参考文章(26)
Sambuddho Chakravarty, Marco V. Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records passive and active network measurement. pp. 247- 257 ,(2014) , 10.1007/978-3-319-04918-2_24
Rob Jansen, Nicholas Hooper, Shadow: Running Tor in a Box for Accurate and Efficient Experimentation network and distributed system security symposium. ,(2011) , 10.21236/ADA559181
Xiaodan Gu, Junzhou Luo, Gaofeng He, Ming Yang, Inferring Application Type Information from Tor Encrypted Traffic international conference on advanced cloud and big data. pp. 220- 227 ,(2014) , 10.1109/.36
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Christian Szegedy, Sergey Ioffe, Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift international conference on machine learning. ,vol. 1, pp. 448- 456 ,(2015)
Mashael AlSabah, Kevin Bauer, Ian Goldberg, Enhancing Tor's performance using real-time traffic classification Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 73- 84 ,(2012) , 10.1145/2382196.2382208
John Barker, Peter Hannay, Patryk Szewczyk, Using Traffic Analysis to Identify the Second Generation Onion Router embedded and ubiquitous computing. pp. 72- 78 ,(2011) , 10.1109/EUC.2011.76
Andrew W. Moore, Denis Zuev, Internet traffic classification using bayesian analysis techniques measurement and modeling of computer systems. ,vol. 33, pp. 50- 60 ,(2005) , 10.1145/1064212.1064220
Yisheng Lv, Yanjie Duan, Wenwen Kang, Zhengxi Li, Fei-Yue Wang, Traffic Flow Prediction With Big Data: A Deep Learning Approach IEEE Transactions on Intelligent Transportation Systems. ,vol. 16, pp. 865- 873 ,(2015) , 10.1109/TITS.2014.2345663
Abdelberi Chaabane, Pere Manils, Mohamed Ali Kaafar, Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network 2010 Fourth International Conference on Network and System Security. pp. 167- 174 ,(2010) , 10.1109/NSS.2010.47