{"title":"匿名通信网络中的应用检测","authors":"Mohammad Hajian Berenjestanaki, M. Akhaee","doi":"10.1145/3277570.3277583","DOIUrl":null,"url":null,"abstract":"Considering the wide application of network communication in the past two decades and the need to protect users' privacy, tools have been developed to make the users' activity unobservable. However, some organizations prevent access to these tools and greatly improved their technical capabilities. To be continuously available for users, these tools must be unobservable to censorship organizations. Considering the importance of unobservability of anonymity tools, this study shows three anonymity tools, including TOR, UltraSurf, and ScrambleSuit, have weaknesses against data flow analysis by designing a supervised classification system. This system works based on machine learning and traffic classification techniques considering a set of features and the correlation between data flows of each application. In the first step, it classifies data flows through a set of extracted statistical features including packet number, size, time interval, etc. Then, the pattern of sessions are evaluated to identify anonymity tools with a higher certainty. Considering the complexities involved in each tool, the obtained results are acceptable implying that the proposed system can be extended to identify other applications.","PeriodicalId":164597,"journal":{"name":"Proceedings of the Central European Cybersecurity Conference 2018","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Application Detection in Anonymous Communication Networks\",\"authors\":\"Mohammad Hajian Berenjestanaki, M. Akhaee\",\"doi\":\"10.1145/3277570.3277583\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Considering the wide application of network communication in the past two decades and the need to protect users' privacy, tools have been developed to make the users' activity unobservable. However, some organizations prevent access to these tools and greatly improved their technical capabilities. To be continuously available for users, these tools must be unobservable to censorship organizations. Considering the importance of unobservability of anonymity tools, this study shows three anonymity tools, including TOR, UltraSurf, and ScrambleSuit, have weaknesses against data flow analysis by designing a supervised classification system. This system works based on machine learning and traffic classification techniques considering a set of features and the correlation between data flows of each application. In the first step, it classifies data flows through a set of extracted statistical features including packet number, size, time interval, etc. Then, the pattern of sessions are evaluated to identify anonymity tools with a higher certainty. Considering the complexities involved in each tool, the obtained results are acceptable implying that the proposed system can be extended to identify other applications.\",\"PeriodicalId\":164597,\"journal\":{\"name\":\"Proceedings of the Central European Cybersecurity Conference 2018\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Central European Cybersecurity Conference 2018\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3277570.3277583\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Central European Cybersecurity Conference 2018","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3277570.3277583","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application Detection in Anonymous Communication Networks
Considering the wide application of network communication in the past two decades and the need to protect users' privacy, tools have been developed to make the users' activity unobservable. However, some organizations prevent access to these tools and greatly improved their technical capabilities. To be continuously available for users, these tools must be unobservable to censorship organizations. Considering the importance of unobservability of anonymity tools, this study shows three anonymity tools, including TOR, UltraSurf, and ScrambleSuit, have weaknesses against data flow analysis by designing a supervised classification system. This system works based on machine learning and traffic classification techniques considering a set of features and the correlation between data flows of each application. In the first step, it classifies data flows through a set of extracted statistical features including packet number, size, time interval, etc. Then, the pattern of sessions are evaluated to identify anonymity tools with a higher certainty. Considering the complexities involved in each tool, the obtained results are acceptable implying that the proposed system can be extended to identify other applications.