Visible to the public Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark

TitleAnonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Publication TypeConference Paper
Year of Publication2017
AuthorsMontieri, A., Ciuonzo, D., Aceto, G., Pescape, A.
Conference Name2017 29th International Teletraffic Congress (ITC 29)
Date Publishedsep
Keywordsanonymity, anonymity services, Bandwidth, Bayes methods, Bayesian Network, belief networks, classifiers, communication content, cryptography, dark web, data privacy, Encryption, Human Behavior, human factors, I2P, Internet, JonDonym, learning (artificial intelligence), machine learning, naive Bayes, network traffic, pattern classification, privacy, pubcrawl, public dataset, Relays, security, security of data, sole statistical features, specific anonymity tool, statistical analysis, telecommunication traffic, Tools, Tor, Traffic classification, users privacy
Abstract

Traffic classification, i.e. associating network traffic to the application that generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D). This process is challenged by applications that preserve Internet users' privacy by encrypting the communication content, and even more by anonymity tools, additionally hiding the source, the destination, and the nature of the communication. In this paper, leveraging a public dataset released in 2017, we provide (repeatable) classification results with the aim of investigating to what degree the specific anonymity tool (and the traffic it hides) can be identified, when compared to the traffic of the other considered anonymity tools, using machine learning approaches based on the sole statistical features. To this end, four classifiers are trained and tested on the dataset: (i) Naive Bayes, (ii) Bayesian Network, (iii) C4.5, and (iv) Random Forest. Results show that the three considered anonymity networks (Tor, I2P, JonDonym) can be easily distinguished (with an accuracy of 99.99%), telling even the specific application generating the traffic (with an accuracy of 98.00%).

URLhttps://ieeexplore.ieee.org/document/8064342
DOI10.23919/ITC.2017.8064342
Citation Keymontieri_anonymity_2017