Haozhan Yin, Jinxuan Cao, Shouzhi Jiang, Tianliang Lu
{"title":"Tor Traffic’s Representation and Classification Based on Packet Timing Characteristics","authors":"Haozhan Yin, Jinxuan Cao, Shouzhi Jiang, Tianliang Lu","doi":"10.1109/AEMCSE55572.2022.00130","DOIUrl":null,"url":null,"abstract":"Tor provides users with great anonymity due to its multi-layer proxy operating mechanism, but also provides living space for illegal and criminal activities. It is necessary to further analyze users' behaviors based on the identification of Tor traffic to effectively supervise Tor users' online conduct. We focus on the differences in traffic patterns when users use different applications, and propose a Tor traffic classification method based on the timing distribution characteristics of packets, which treats each packet as an object with several attributes, analyzes its distribution in unit time, and generates visual samples, finally use CNN to identify the application type. Focusing on the transmission stage of application data, this method can effectively avoid the influence of Tor’s existing defense mechanism, and the processed samples can intuitively present the traffic features of a specific application that are visible to the naked eye. The experiment al results show that the proposed method can not only provide higher recognition accuracy but also effectively improve the problem of poor recognition ability of previous models for certain application types.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AEMCSE55572.2022.00130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Tor provides users with great anonymity due to its multi-layer proxy operating mechanism, but also provides living space for illegal and criminal activities. It is necessary to further analyze users' behaviors based on the identification of Tor traffic to effectively supervise Tor users' online conduct. We focus on the differences in traffic patterns when users use different applications, and propose a Tor traffic classification method based on the timing distribution characteristics of packets, which treats each packet as an object with several attributes, analyzes its distribution in unit time, and generates visual samples, finally use CNN to identify the application type. Focusing on the transmission stage of application data, this method can effectively avoid the influence of Tor’s existing defense mechanism, and the processed samples can intuitively present the traffic features of a specific application that are visible to the naked eye. The experiment al results show that the proposed method can not only provide higher recognition accuracy but also effectively improve the problem of poor recognition ability of previous models for certain application types.