Detection of obfuscated Tor traffic based on bidirectional generative adversarial networks and vision transform

被引:7
作者
Al-E'mari, Salam [1 ]
Sanjalawe, Yousef [2 ]
Fraihat, Salam [3 ]
机构
[1] Univ Petra, Fac Informat Technol, Informat Secur Dept, Amman 11196, Jordan
[2] Amer Univ Madaba, Sch Informat Technol, Cybersecur Dept, Amman 11821, Jordan
[3] Ajman Univ, Coll Engn & Informat Technol, Artificial Intelligence Res Ctr AIRC, Ajman 346, U Arab Emirates
关键词
BiGAN; Obfuscated detection; ViT; Tor traffic system;
D O I
10.1016/j.cose.2023.103512
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Onion Router (TOR) network is a decentralized system of volunteer-run servers that aims to protect the anonymity and privacy of users by routing their internet traffic through a series of nodes. Individuals who use the TOR network may employ obfuscated traffic to conceal their internet activity from network administrators or security systems attempting to block or monitor them. Furthermore, some may use obfuscated Tor traffic to hide illegal activities, such as buying and selling illegal goods or accessing illegal services on the dark web. Despite efforts to identify and block Tor traffic, challenges remain, such as a limited set of features for identification, leading to false positives and negatives. To address these challenges, this paper proposes a novel approach using Visual Transformation (ViT), and augmentation by Bidirectional Generative Adversarial Networks (BiGAN). The proposed approach demonstrates superior performance on the ISCX-Tor2016 dataset, achieving 99.59% accuracy, 99.83% recall, 99.72% precision, and 99.78% F-score, thereby outperforming current state-of-the-art techniques.
引用
收藏
页数:10
相关论文
共 47 条
[1]   Machine-Learning-Based Darknet Traffic Detection System for IoT Applications [J].
Abu Al-Haija, Qasem ;
Krichen, Moez ;
Abu Elhaija, Wejdan .
ELECTRONICS, 2022, 11 (04)
[2]   Iot based smart transport management and vehicle-to-vehicle communication system [J].
Agarwal V. ;
Sharma S. ;
Agarwal P. .
Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 :709-716
[3]  
Agarwal V., 2022, Int. J. Image Graph. Signal Process., V14, P25, DOI 10.5815/ijigsp.2022.02.03
[4]  
Agarwal V., 2023, Int. J. Veh. Inf. Commun. Syst., V8, P16
[5]  
Agarwal V., 2022, Int. J. Comput. Digit. Syst, V12, P1305
[6]  
Al-E'mari Salam, 2021, Advances in Cyber Security: Second International Conference, ACeS 2020. Communications in Computer and Information Science (1347), P61, DOI 10.1007/978-981-33-6835-4_5
[7]   Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges [J].
Al-E'mari, Salam ;
Anbar, Mohammed ;
Sanjalawe, Yousef ;
Manickam, Selvakumar ;
Hasbullah, Iznan .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (01) :87-112
[8]  
Althobaiti T., 2023, Comput. Syst. Sci. Eng.
[9]  
Arikkat Dincy, 2022, IC3-2022: Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, P305, DOI 10.1145/3549206.3549262
[10]  
Bian J., 2021, J Phys. Conf. Ser., V1