Traffic Classification of User Behaviors in Tor, 12P, ZeroNet, Freenet

被引:23
作者
Hu, Yuzong [1 ]
Zou, Futai [1 ]
Li, Linsen [1 ]
Yi, Ping [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Cyber Sci & Engn, Shanghai 200240, Peoples R China
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
关键词
Darknet; Traffic Classification; User Behavior; Hierarchical Classification; Tor; I2P; Freenet; ZeroNet;
D O I
10.1109/TrustCom50675.2020.00064
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, more and more anonymous network have been developed. Since user's identity is difficult to trace in anonymous networks, many illegal activities are carried out in darknet. In this paper, we propose a hierarchical classifier of darknet traffic which can distinguish four types of darknet(Tor, I2P, ZeroNet, Freenet) and 25 darknet users' behavior. Due to the lack of public datasets, we deployed a darknet data probe that can capture real darknet traffic in Tor, I2P, ZeroNet, Freenet. After collecting and labeling darknet traffic, we extract 26 time-based flow features that can represent the characteristics of darknet traffic and train a hierarchical classifier constructed by 6 local classifiers. Results show that the classifier can easily distinguish Tor, I2P, ZeroNet, Freenet four kinds of darknet clients with an accuracy of 96.9% and identify 8 kinds of user behaviors for each type of darknet with an accuracy of 91.6% on average. With the help of this hierarchical classification method, darknet user behaviors can be accurately distinguished at the traffic exit.
引用
收藏
页码:418 / 424
页数:7
相关论文
共 26 条
[1]  
Al Sabah M., 2012, P 2012 ACM C COMP CO, P73, DOI [10.1145/2382196.2382208, DOI 10.1145/2382196.2382208]
[2]  
[Anonymous], 2019, IEEE T NETW SCI ENG
[3]  
Barker J., 2011, 2011 Proceedings of IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing (EUC 2011), P72, DOI 10.1109/EUC.2011.76
[4]  
Bauer K.S., 2011, EXPERIMENTOR TESTBED
[5]  
Breiman L., 2001, IEEE Trans. Broadcast., V45, P5
[6]  
Cai ZZ, 2019, IEEE IJCNN
[7]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794
[8]  
Clarke L., 2001, Designing Privacy Enhancing Technologies. International Workshop on Design Issues in Anonymity and Unobservability. Proceedings (Lecture Notes in Computer Science Vol.2009), P46
[9]  
Cuzzocrea A, 2017, IEEE INT CONF BIG DA, P4474, DOI 10.1109/BigData.2017.8258487
[10]  
Diaz Claudia, 2018, NDSS