A novel application classification attack against Tor

被引:27
作者
He, Gaofeng [1 ]
Yang, Ming [2 ]
Luo, Junzhou [2 ]
Gu, Xiaodan [2 ]
机构
[1] State Grid Smart Grid Res Inst, Nanjing, Jiangsu, Peoples R China
[2] Southeast Univ, Sch Engn & Comp Sci, Nanjing, Jiangsu, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
application classification; behavior model; profile HMM; Tor; anonymous communication; privacy; MULTIPLE SEQUENCE ALIGNMENT; HIDDEN MARKOV-MODELS; CLUSTAL-W;
D O I
10.1002/cpe.3593
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Tor is a famous anonymous communication system for preserving users' online privacy. It supports TCP applications and packs upper-layer application data into encrypted equal-sized cells with onion routing to hide private information of users. However, we note that the current Tor design cannot conceal certain application behaviors. For example, P2P applications usually upload and download files simultaneously, and this behavioral feature is also kept in Tor traffic. Motivated by this observation, we investigate a new attack against Tor, application classification attack, which can recognize application types from Tor traffic. An attacker first carefully selects some flow features such as burst volumes and directions to represent the application behaviors and takes advantage of some efficient machine-learning algorithm (e.g., Profile Hidden Markov Model) to model different types of applications. Then he or she can use these established models to classify target's Tor traffic and infer its application type. We have implemented the application classification attack on Tor using parallel computing, and our experiments validate the feasibility and effectiveness of the attack. We argue that the disclosure of application type information is a serious threat to Tor users' anonymity because it can be used to reduce the anonymity set and facilitate other attacks. We also present guidelines to defend against application classification attack. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:5640 / 5661
页数:22
相关论文
共 41 条
[1]  
AlSabah M, 2011, LECT NOTES COMPUT SC, V6794, P134, DOI 10.1007/978-3-642-22263-4_8
[2]  
AlSabah Mashael, 2012, P 2012 ACM C COMP CO, P73, DOI [10.1145/2382196.2382208, DOI 10.1145/2382196.2382208]
[3]  
[Anonymous], 2006, HOT NOT REVEALING HI, DOI [DOI 10.1145/1180405.1180410, 10.1145/1180405.1180410]
[4]  
[Anonymous], 2009, P 2009 ACM WORKSH CL
[5]  
Bhargava Aditya., 2009, ACL SRW, P43
[6]   Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization [J].
Biryukov, Alex ;
Pustogarov, Ivan ;
Weinmann, Ralf-Philipp .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :80-94
[7]  
Cai X., 2012, P 2012 ACM C COMP CO, P605, DOI [DOI 10.1145/2382196.2382260, 10.1145/2382196.2382260]
[8]   TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security [J].
Chen, Zhen ;
Ruan, Lingyun ;
Cao, Junwei ;
Yu, Yifan ;
Jiang, Xin .
TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (04) :406-417
[9]  
Dengle S, 2014, INT J SCI RES, V8, P691
[10]  
Dingledine R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P303