{"title":"Anonymous Traffic Detection and Identification","authors":"Warda Amalou, M. Mehdi","doi":"10.1109/ICAECCS56710.2023.10104742","DOIUrl":null,"url":null,"abstract":"Nowadays, anonymous communication technology attracts a lot of attention because it can hide identity information to achieve secure communication. Invisible Internet Project (I2P) and The Onion Router (TOR) are the most widely used open-source anonymous communication tools. Based on the analysis of the implementation mechanism of I2P and TOR anonymous service, this paper aims to identify the use of this kind of traffic through the DPI’’ Deep Packet Inspection’’ method, in order to obtain the lowest level of false positives for the detection and identification of anonymous network traffic. An experimental study using Snort’’ Network Intrusion Detection System (NIDS)’’ allowed us to detect the use of Tor/I2P networks based on a fingerprint database based on a set of Snort rules were developed as a proof-of-concept for the proposed I2P and Tor detection approach.","PeriodicalId":447668,"journal":{"name":"2023 International Conference on Advances in Electronics, Control and Communication Systems (ICAECCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advances in Electronics, Control and Communication Systems (ICAECCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECCS56710.2023.10104742","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, anonymous communication technology attracts a lot of attention because it can hide identity information to achieve secure communication. Invisible Internet Project (I2P) and The Onion Router (TOR) are the most widely used open-source anonymous communication tools. Based on the analysis of the implementation mechanism of I2P and TOR anonymous service, this paper aims to identify the use of this kind of traffic through the DPI’’ Deep Packet Inspection’’ method, in order to obtain the lowest level of false positives for the detection and identification of anonymous network traffic. An experimental study using Snort’’ Network Intrusion Detection System (NIDS)’’ allowed us to detect the use of Tor/I2P networks based on a fingerprint database based on a set of Snort rules were developed as a proof-of-concept for the proposed I2P and Tor detection approach.