A novel application classification attack against Tor

作者: Gaofeng He , Ming Yang , Junzhou Luo , Xiaodan Gu

DOI: 10.1002/CPE.3593

关键词: EncryptionPrivate information retrievalOnion routingSet (abstract data type)Computer securityComputer scienceUploadCommunications system

摘要: Tor is a famous anonymous communication system for preserving users' online privacy. It supports TCP applications and packs upper-layer application data into encrypted equal-sized cells with onion routing to hide private information of users. However, we note that the current design cannot conceal certain behaviors. For example, P2P usually upload download files simultaneously, this behavioral feature also kept in traffic. Motivated by observation, investigate new attack against Tor, classification attack, which can recognize types from An attacker first carefully selects some flow features such as burst volumes directions represent behaviors takes advantage efficient machine-learning algorithm e.g., Profile Hidden Markov Model model different applications. Then he or she use these established models classify target's traffic infer its type. We have implemented on using parallel computing, our experiments validate feasibility effectiveness attack. argue disclosure type serious threat anonymity because it be used reduce set facilitate other attacks. present guidelines defend Copyright © 2015 John Wiley & Sons, Ltd.

参考文章(41)
Neeru Yadav, Kiran P. Somase, Siddhi Vinayak, Analysis of a new cell-counting-based attack against connection based Tor ,(2014)
Volker Fusenig, Uli Sorger, Thomas Engel, Eugen Staab, Slotted packet counting attacks on anonymity protocols artificial intelligence and symbolic computation. pp. 53- 60 ,(2009)
Sid Ray, Rose H Turi, Determination of Number of Clusters in K-Means Clustering and Application in Colour Image Segmentation international conference on advances in pattern recognition. pp. 137- 143 ,(2000)
Buyun Qu, Zhibin Zhang, Xingquan Zhu, Dan Meng, An empirical study of morphing on behavior-based network traffic classification Security and Communication Networks. ,vol. 8, pp. 68- 79 ,(2015) , 10.1002/SEC.755
Dominik Herrmann, Christoph Gerber, Christian Banse, Hannes Federrath, Analyzing characteristic host access patterns for re-identification of web user sessions nordic conference on secure it systems. pp. 136- 154 ,(2010) , 10.1007/978-3-642-27937-9_10
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker, DefenestraTor: Throwing Out Windows in Tor Privacy Enhancing Technologies. pp. 134- 154 ,(2011) , 10.1007/978-3-642-22263-4_8
Rob Jansen, Paul Syverson, Nicholas J. Hopper, Throttling Tor bandwidth parasites usenix security symposium. pp. 18- 18 ,(2012) , 10.21236/ADA559183
Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Guiyi Wei, Laurence T. Yang, Internet Traffic Classification Using Constrained Clustering IEEE Transactions on Parallel and Distributed Systems. ,vol. 25, pp. 2932- 2943 ,(2014) , 10.1109/TPDS.2013.307