Seeing through Network-Protocol Obfuscation

作者: Liang Wang , Kevin P. Dyer , Aditya Akella , Thomas Ristenpart , Thomas Shrimpton

DOI: 10.1145/2810103.2813715

关键词:

摘要: Censorship-circumvention systems are designed to help users bypass Internet censorship. As more sophisticated deep-packet-inspection (DPI) mechanisms have been deployed by censors detect circumvention tools, activists and researchers responded developing network protocol obfuscation tools. These proved be effective in practice against existing DPI now distributed with such as Tor. In this work, we provide the first in-depth investigation of detectability in-use obfuscators DPI. We build a framework for evaluation that uses real traffic captures evaluate detectability, based on metrics false-positive rate background (i.e., non obfuscated) traffic. exercise our show some previously proposed attacks from literature not censor might like. go develop new five tools they configured Tor, including: two variants obfsproxy, FTE, meek. conclude using all these could reliably detected determined sufficiently low rates use many censorship settings.

参考文章(39)
A. Houmansadr, C. Brubaker, V. Shmatikov, The Parrot Is Dead: Observing Unobservable Network Communications ieee symposium on security and privacy. pp. 65- 79 ,(2013) , 10.1109/SP.2013.14
Nigel Williams, Sebastian Zander, Grenville Armitage, A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification ACM SIGCOMM Computer Communication Review. ,vol. 36, pp. 5- 16 ,(2006) , 10.1145/1163593.1163596
Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg, SkypeMorph Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 97- 108 ,(2012) , 10.1145/2382196.2382210
Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Andreas Müller, Joel Nothman, Gilles Louppe, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, Édouard Duchesnay, Scikit-learn: Machine Learning in Python Journal of Machine Learning Research. ,vol. 12, pp. 2825- 2830 ,(2011)
Charles Reis, Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan, Measurement-based models of delivery and interference in static wireless networks acm special interest group on data communication. ,vol. 36, pp. 51- 62 ,(2006) , 10.1145/1151659.1159921
Ashish Thusoo, Joydeep Sen Sarma, Namit Jain, Zheng Shao, Prasad Chakka, Suresh Anthony, Hao Liu, Pete Wyckoff, Raghotham Murthy, Hive: a warehousing solution over a map-reduce framework very large data bases. ,vol. 2, pp. 1626- 1629 ,(2009) , 10.14778/1687553.1687609
Stefan Lindskog, Philipp Winter, How the Great Firewall of China is Blocking Tor foundations of computational intelligence. pp. 7- ,(2012)
Laurent Bernaille, Renata Teixeira, Ismael Akodkenou, Augustin Soule, Kave Salamatian, Traffic classification on the fly ACM SIGCOMM Computer Communication Review. ,vol. 36, pp. 23- 26 ,(2006) , 10.1145/1129582.1129589
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, Rachel Greenstadt, A Critical Evaluation of Website Fingerprinting Attacks computer and communications security. pp. 263- 274 ,(2014) , 10.1145/2660267.2660368
J. Yuan, Z. Li, R. Yuan, Information Entropy Based Clustering Method for Unsupervised Internet Traffic Classification international conference on communications. pp. 1588- 1592 ,(2008) , 10.1109/ICC.2008.307