Improving the performance of Machine Learning Algorithms for TOR detection

被引:7
作者
Gurunarayanan, Adityan [1 ]
Agrawal, Ankit [1 ]
Bhatia, Ashutosh [1 ]
Vishwakarma, Deepak Kumar [2 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Bangalore Def Res Dev Org DRDO, Ctr Artificial Intelligence & Robot CAIR, Bangalore, Karnataka, India
来源
35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021) | 2021年
关键词
TOR; Grid Search Algorithms; Machine Learning;
D O I
10.1109/ICOIN50884.2021.9333989
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Onion Router (TOR) networks provide anonymity, in terms of identity and location, to the Internet users by encrypting traffic multiple times along the path and routing it via an overlay network of servers. Although TOR was initially developed as a medium to maintain users' privacy, cyber criminals and hackers take advantage of this anonymity, and as a result, many illegal activities are carried out using TOR networks. With the ever-changing landscape of Internet services, traditional traffic analysis methods are not efficient for analyzing encrypted traffic and there is a need for alternative methods for analyzing TOR traffic. In this paper, we develop a machine learning model to identify whether a given network traffic is TOR or nonTOR. We use the ISCX2016 TOR-nonTOR dataset to train our model and perform random oversampling and random undersampling to remove data imbalance. Furthermore, to improve the efficiency of our classifiers, we use k-fold cross-validation and Grid Search algorithms for hyperparameter tuning. Results show that we achieve more than 90% accuracy with random sampling and hyperparameter tuning methods.
引用
收藏
页码:439 / 444
页数:6
相关论文
共 19 条
[1]  
Almubayed Alaeddin, 2015, International Journal of Computer Network and Information Security, V7, P10, DOI 10.5815/ijcnis.2015.07.02
[2]  
Aminuddin MAIM, 2018, INT J ADV COMPUT SC, V9, P113
[3]  
[Anonymous], 2004, TOR 2 GENERATION ONI
[4]   A geographical analysis of trafficking on a popular darknet market [J].
Broseus, Julian ;
Rhumorbarbe, Damien ;
Morelato, Marie ;
Staehli, Ludovic ;
Rossy, Quentin .
FORENSIC SCIENCE INTERNATIONAL, 2017, 277 :88-102
[5]  
Chaabane A., 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P167, DOI 10.1109/NSS.2010.47
[6]  
Cuzzocrea A., 2017, TOR TRAFFIC ANAL DET
[7]  
Hellebrandt L, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), P29, DOI [10.1109/bloc.2019.8751340, 10.1109/BLOC.2019.8751340]
[8]  
Hodo E., 2017, ARES, P6
[9]  
Jia LY, 2017, I C COMM SOFTW NET, P239, DOI 10.1109/ICCSN.2017.8230113
[10]   Characterization of Tor Traffic using Time based Features [J].
Lashkari, Arash Habibi ;
Gil, Gerard Draper ;
Mamun, Mohammad Saiful Islam ;
Ghorbani, Ali A. .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :253-262