匿名通信网络中的应用检测

Mohammad Hajian Berenjestanaki, M. Akhaee
{"title":"匿名通信网络中的应用检测","authors":"Mohammad Hajian Berenjestanaki, M. Akhaee","doi":"10.1145/3277570.3277583","DOIUrl":null,"url":null,"abstract":"Considering the wide application of network communication in the past two decades and the need to protect users' privacy, tools have been developed to make the users' activity unobservable. However, some organizations prevent access to these tools and greatly improved their technical capabilities. To be continuously available for users, these tools must be unobservable to censorship organizations. Considering the importance of unobservability of anonymity tools, this study shows three anonymity tools, including TOR, UltraSurf, and ScrambleSuit, have weaknesses against data flow analysis by designing a supervised classification system. This system works based on machine learning and traffic classification techniques considering a set of features and the correlation between data flows of each application. In the first step, it classifies data flows through a set of extracted statistical features including packet number, size, time interval, etc. Then, the pattern of sessions are evaluated to identify anonymity tools with a higher certainty. Considering the complexities involved in each tool, the obtained results are acceptable implying that the proposed system can be extended to identify other applications.","PeriodicalId":164597,"journal":{"name":"Proceedings of the Central European Cybersecurity Conference 2018","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Application Detection in Anonymous Communication Networks\",\"authors\":\"Mohammad Hajian Berenjestanaki, M. Akhaee\",\"doi\":\"10.1145/3277570.3277583\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Considering the wide application of network communication in the past two decades and the need to protect users' privacy, tools have been developed to make the users' activity unobservable. However, some organizations prevent access to these tools and greatly improved their technical capabilities. To be continuously available for users, these tools must be unobservable to censorship organizations. Considering the importance of unobservability of anonymity tools, this study shows three anonymity tools, including TOR, UltraSurf, and ScrambleSuit, have weaknesses against data flow analysis by designing a supervised classification system. This system works based on machine learning and traffic classification techniques considering a set of features and the correlation between data flows of each application. In the first step, it classifies data flows through a set of extracted statistical features including packet number, size, time interval, etc. Then, the pattern of sessions are evaluated to identify anonymity tools with a higher certainty. Considering the complexities involved in each tool, the obtained results are acceptable implying that the proposed system can be extended to identify other applications.\",\"PeriodicalId\":164597,\"journal\":{\"name\":\"Proceedings of the Central European Cybersecurity Conference 2018\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Central European Cybersecurity Conference 2018\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3277570.3277583\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Central European Cybersecurity Conference 2018","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3277570.3277583","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

考虑到近二十年来网络通信的广泛应用和保护用户隐私的需要,开发了使用户的活动不可观察的工具。然而,一些组织阻止访问这些工具,并大大提高了他们的技术能力。为了使用户持续可用,这些工具必须不被审查机构发现。考虑到匿名工具不可观察性的重要性,本研究通过设计监督分类系统,揭示了TOR、UltraSurf和ScrambleSuit三种匿名工具在数据流分析方面存在的缺陷。该系统基于机器学习和流量分类技术,考虑了每个应用程序的数据流之间的一组特征和相关性。在第一步中,它通过一组提取的统计特征对数据流进行分类,这些统计特征包括包数、大小、时间间隔等。然后,评估会话模式,以更高的确定性识别匿名工具。考虑到每个工具所涉及的复杂性,所获得的结果是可以接受的,这意味着所建议的系统可以扩展以识别其他应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Application Detection in Anonymous Communication Networks
Considering the wide application of network communication in the past two decades and the need to protect users' privacy, tools have been developed to make the users' activity unobservable. However, some organizations prevent access to these tools and greatly improved their technical capabilities. To be continuously available for users, these tools must be unobservable to censorship organizations. Considering the importance of unobservability of anonymity tools, this study shows three anonymity tools, including TOR, UltraSurf, and ScrambleSuit, have weaknesses against data flow analysis by designing a supervised classification system. This system works based on machine learning and traffic classification techniques considering a set of features and the correlation between data flows of each application. In the first step, it classifies data flows through a set of extracted statistical features including packet number, size, time interval, etc. Then, the pattern of sessions are evaluated to identify anonymity tools with a higher certainty. Considering the complexities involved in each tool, the obtained results are acceptable implying that the proposed system can be extended to identify other applications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信