IM session identification by outlier detection in cross-correlation functions

作者: Saad Saleh , Muhammad U. Ilyas , Khawar Khurshid , Alex X. Liu , Hayder Radha

DOI: 10.1109/CISS.2015.7086851

关键词:

摘要: The identification of encrypted Instant Messaging (IM) channels between users is made difficult by the presence variable and high levels uncorrelated background traffic. In this paper, we propose a novel Cross-correlation Outlier Detector (CCOD) to identify communicating end-users in large group users. Our technique uses traffic flow traces individual IM service provider's data center. We evaluate CCOD on set Yahoo! with an average SNR −6.11dB (data includes ground truth). Results show that our provides 88% true positives (TP) rate, 3% false (FP) rate 96% ROC area. Performance previous correlation-based schemes same was limited 63% TP 4% FP 85%

参考文章(21)
Lu Zhang, Junzhou Luo, Ming Yang, Gaofeng He, Application-level attack against Tor's hidden service international conference on pervasive computing. pp. 509- 516 ,(2011) , 10.1109/ICPCA.2011.6106555
John Barker, Peter Hannay, Patryk Szewczyk, Using Traffic Analysis to Identify the Second Generation Onion Router embedded and ubiquitous computing. pp. 72- 78 ,(2011) , 10.1109/EUC.2011.76
Eric Chan-Tin, Jiyoung Shin, Jiangmin Yu, Revisiting Circuit Clogging Attacks on Tor availability, reliability and security. pp. 131- 140 ,(2013) , 10.1109/ARES.2013.17
Muhammad Aliyu Sulaiman, Sami Zhioua, Attacking Tor through Unpopular Ports international conference on distributed computing systems workshops. pp. 33- 38 ,(2013) , 10.1109/ICDCSW.2013.29
Muhammad U. Ilyas, M. Zubair Shafiq, Alex X. Liu, Hayder Radha, Who are you talking to? Breaching privacy in encrypted IM networks international conference on network protocols. pp. 1- 10 ,(2013) , 10.1109/ICNP.2013.6733573
Saad Saleh, Mamoon Raja, Muhammad Shahnawaz, Muhammad U. Ilyas, Khawar Khurshid, M. Zubair Shafiq, Alex X. Liu, Hayder Radha, Shirish S. Karande, Breaching IM session privacy using causality global communications conference. pp. 686- 691 ,(2014) , 10.1109/GLOCOM.2014.7036887
Xuefeng Bai, Yong Zhang, Xiamu Niu, Traffic Identification of Tor and Web-Mix intelligent systems design and applications. ,vol. 1, pp. 548- 551 ,(2008) , 10.1109/ISDA.2008.209
Elena Zheleva, Lise Getoor, To join or not to join Proceedings of the 18th international conference on World wide web - WWW '09. pp. 531- 540 ,(2009) , 10.1145/1526709.1526781
Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis, Identifying Proxy Nodes in a Tor Anonymization Circuit 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems. pp. 633- 639 ,(2008) , 10.1109/SITIS.2008.93
L. Overlier, P. Syverson, Locating hidden servers ieee symposium on security and privacy. pp. 100- 114 ,(2006) , 10.1109/SP.2006.24