How Far Can We Push Flow Analysis to Identify Encrypted Anonymity Network Traffic?
Title | How Far Can We Push Flow Analysis to Identify Encrypted Anonymity Network Traffic? |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Shahbar, K., Zincir-Heywood, A. N. |
Conference Name | NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium |
Date Published | apr |
Keywords | anonymity, anonymity network users, Bandwidth, composability, cryptography, data privacy, dataset, encrypted anonymity network traffic, Encryption, flow analysis approach, Human Behavior, human factors, I2P, Internet, JonDonym, learning (artificial intelligence), machine learning, Metrics, Protocols, pubcrawl, resilience, Resiliency, telecommunication traffic, Tools, Tor, Traffic flow, traffic flow behavior, traffic flow Identification |
Abstract | Anonymity networks provide privacy to the users by relaying their data to multiple destinations in order to reach the final destination anonymously. Multilayer of encryption is used to protect the users' privacy from attacks or even from the operators of the stations. In this research, we showed how flow analysis could be used to identify encrypted anonymity network traffic under four scenarios: (i) Identifying anonymity networks compared to normal background traffic; (ii) Identifying the type of applications used on the anonymity networks; (iii) Identifying traffic flow behaviors of the anonymity network users; and (iv) Identifying / profiling the users on an anonymity network based on the traffic flow behavior. In order to study these, we employ a machine learning based flow analysis approach and explore how far we can push such an approach. |
URL | https://ieeexplore.ieee.org/document/8406156 |
DOI | 10.1109/NOMS.2018.8406156 |
Citation Key | shahbarHowFarCan2018 |
- JonDonym
- traffic flow Identification
- traffic flow behavior
- Traffic flow
- Tor
- tools
- telecommunication traffic
- Resiliency
- resilience
- pubcrawl
- Protocols
- Metrics
- machine learning
- learning (artificial intelligence)
- anonymity
- internet
- I2P
- Human Factors
- Human behavior
- flow analysis approach
- encryption
- encrypted anonymity network traffic
- dataset
- data privacy
- Cryptography
- composability
- Bandwidth
- anonymity network users