Mengyan Liu , Gaopeng Gou , Gang Xiong , Junzheng Shi , Zhong Guan , Hanwen Miao , Chen Chen
{"title":"ProxyCorr: robust traffic correlation attacks via mixed spatio-temporal analysis in encrypted proxy networks","authors":"Mengyan Liu , Gaopeng Gou , Gang Xiong , Junzheng Shi , Zhong Guan , Hanwen Miao , Chen Chen","doi":"10.1016/j.comnet.2025.111763","DOIUrl":null,"url":null,"abstract":"<div><div>End-to-end traffic correlation attacks, aiming to deanonymize users in anonymous communication systems, have achieved significant advancements through deep learning. However, existing methods suffer significant limitations in encrypted proxy networks, especially when obfuscation techniques are employed. To address these limitations, we propose ProxyCorr, a model that achieves accurate traffic correlation across diverse encrypted proxy protocols. Specifically, we model network flows as state sequences and derive temporal dependencies through state transition analysis. Additionally, to capture spatial similarity patterns, we model flows as 2D spatial trajectories, with Gaussian filtering applied to mitigate jitter. Further, we design a self-attention-based correlation learning module to extract inherent spatio-temporal features, which are then adaptively integrated to enhance flow correlation performance. Extensive experiments on multiple encrypted-proxy datasets demonstrate that ProxyCorr outperforms state-of-the-art methods in effectiveness while maintaining robustness against obfuscation techniques, including packet size padding and multiplexing.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"273 ","pages":"Article 111763"},"PeriodicalIF":4.6000,"publicationDate":"2025-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625007297","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
End-to-end traffic correlation attacks, aiming to deanonymize users in anonymous communication systems, have achieved significant advancements through deep learning. However, existing methods suffer significant limitations in encrypted proxy networks, especially when obfuscation techniques are employed. To address these limitations, we propose ProxyCorr, a model that achieves accurate traffic correlation across diverse encrypted proxy protocols. Specifically, we model network flows as state sequences and derive temporal dependencies through state transition analysis. Additionally, to capture spatial similarity patterns, we model flows as 2D spatial trajectories, with Gaussian filtering applied to mitigate jitter. Further, we design a self-attention-based correlation learning module to extract inherent spatio-temporal features, which are then adaptively integrated to enhance flow correlation performance. Extensive experiments on multiple encrypted-proxy datasets demonstrate that ProxyCorr outperforms state-of-the-art methods in effectiveness while maintaining robustness against obfuscation techniques, including packet size padding and multiplexing.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.