Characterization of Tor Traffic using Time based Features

被引:532
作者
Lashkari, Arash Habibi [1 ]
Gil, Gerard Draper [1 ]
Mamun, Mohammad Saiful Islam [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] Univ New Brunswick, Canadian Inst Cybersecur, Fredericton, NB, Canada
来源
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2017年
关键词
Tor; Network Traffic Characterization; Network Traffic Analysis; Time-based Features; Machine Learning; CLASSIFICATION;
D O I
10.5220/0006105602530262
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traffic classification has been the topic of many research efforts, but the quick evolution of Internet services and the pervasive use of encryption makes it an open challenge. Encryption is essential in protecting the privacy of Internet users, a key technology used in the different privacy enhancing tools that have appeared in the recent years. Tor is one of the most popular of them, it decouples the sender from the receiver by encrypting the traffic between them, and routing it through a distributed network of servers. In this paper, we present a time analysis on Tor traffic flows, captured between the client and the entry node. We define two scenarios, one to detect Tor traffic flows and the other to detect the application type: Browsing, Chat, Streaming, Mail, Voip, P2P or File Transfer. In addition, with this paper we publish the Tor labelled dataset we generated and used to test our classifiers.
引用
收藏
页码:253 / 262
页数:10
相关论文
共 20 条
[1]   A Proxy Identifier based on Patterns in Traffic Flows [J].
Aghaei-Foroushani, Vahid ;
Zincir-Heywood, A. Nur .
2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2015, :118-125
[2]  
AlSabah Mashael, 2012, P 2012 ACM C COMP CO, P73, DOI [10.1145/2382196.2382208, DOI 10.1145/2382196.2382208]
[3]  
[Anonymous], 2004, P 13 C USENIX SEC S, DOI [DOI 10.5555/1251375.1251396, DOI 10.1186/1476-0711-3-21]
[4]   Traffic Identification of Tor and Web-Mix [J].
Bai, Xuefeng ;
Zhang, Yong ;
Niu, Xiamu .
ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, :548-551
[5]   A Survey on Internet Traffic Identification [J].
Callado, Arthur ;
Kamienski, Carlos ;
Szabo, Geza ;
Gero, Balazs Peter ;
Kelner, Judith ;
Fernandes, Stenio ;
Sadok, Djamel .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (03) :37-52
[6]  
Chaabane A., 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P167, DOI 10.1109/NSS.2010.47
[7]  
Chakravarty Sambuddho, 2014, Passive and Active Measurement. 15th International Conference, PAM 2014. Proceedings: LNCS 8362, P247, DOI 10.1007/978-3-319-04918-2_24
[8]   Issues and Future Directions in Traffic Classification [J].
Dainotti, Alberto ;
Pescape, Antonio ;
Claffy, Kimberly C. .
IEEE NETWORK, 2012, 26 (01) :35-40
[9]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[10]  
Gaofeng He, 2014, 2014 Second International Conference on Advanced Cloud and Big Data (CBD), P220, DOI 10.1109/CBD.2014.37