Detection of obfuscated Tor traffic based on bidirectional generative adversarial networks and vision transform

被引:7
作者
Al-E'mari, Salam [1 ]
Sanjalawe, Yousef [2 ]
Fraihat, Salam [3 ]
机构
[1] Univ Petra, Fac Informat Technol, Informat Secur Dept, Amman 11196, Jordan
[2] Amer Univ Madaba, Sch Informat Technol, Cybersecur Dept, Amman 11821, Jordan
[3] Ajman Univ, Coll Engn & Informat Technol, Artificial Intelligence Res Ctr AIRC, Ajman 346, U Arab Emirates
关键词
BiGAN; Obfuscated detection; ViT; Tor traffic system;
D O I
10.1016/j.cose.2023.103512
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Onion Router (TOR) network is a decentralized system of volunteer-run servers that aims to protect the anonymity and privacy of users by routing their internet traffic through a series of nodes. Individuals who use the TOR network may employ obfuscated traffic to conceal their internet activity from network administrators or security systems attempting to block or monitor them. Furthermore, some may use obfuscated Tor traffic to hide illegal activities, such as buying and selling illegal goods or accessing illegal services on the dark web. Despite efforts to identify and block Tor traffic, challenges remain, such as a limited set of features for identification, leading to false positives and negatives. To address these challenges, this paper proposes a novel approach using Visual Transformation (ViT), and augmentation by Bidirectional Generative Adversarial Networks (BiGAN). The proposed approach demonstrates superior performance on the ISCX-Tor2016 dataset, achieving 99.59% accuracy, 99.83% recall, 99.72% precision, and 99.78% F-score, thereby outperforming current state-of-the-art techniques.
引用
收藏
页数:10
相关论文
共 47 条
[21]  
Johnson C., 2021, J. Internet Serv. Inf. Secur, V11, P44
[22]   Cryptocurrency market efficiency in short- and long-term horizons during COVID-19: An asymmetric multifractal analysis approach [J].
Kakinaka, Shinji ;
Umeno, Ken .
FINANCE RESEARCH LETTERS, 2022, 46
[23]  
Kaplan M. Oguz, 2020, Procedia Computer Science, V176, P185, DOI 10.1016/j.procs.2020.08.020
[24]  
Khorana S., 2017, Journalism after Snowden: The Future of the Free Press in the Surveillance State
[25]   Characterization of Tor Traffic using Time based Features [J].
Lashkari, Arash Habibi ;
Gil, Gerard Draper ;
Mamun, Mohammad Saiful Islam ;
Ghorbani, Ali A. .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :253-262
[26]  
Lewman A, 2013, ADVANCES IN CYBER SECURITY: TECHNOLOGY, OPERATIONS, AND EXPERIENCES, P109
[27]  
Li M., 2023, Comput. Syst. Sci. Eng., V46
[28]   TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT [J].
Lin, Kunda ;
Xu, Xiaolong ;
Gao, Honghao .
COMPUTER NETWORKS, 2021, 190
[29]  
Marim M.C., 2023, Intell. Syst. Appl., V18
[30]  
Mehta S.D., 2020, Int. J. Eng. Res. Technol. (IJERT), V9, P776