2015
DOI: 10.1002/cpe.3593
|View full text |Cite
|
Sign up to set email alerts
|

A novel application classification attack against Tor

Abstract: SUMMARYTor is a famous anonymous communication system for preserving users' online privacy. It supports TCP applications and packs upper-layer application data into encrypted equal-sized cells with onion routing to hide private information of users. However, we note that the current Tor design cannot conceal certain application behaviors. For example, P2P applications usually upload and download files simultaneously, and this behavioral feature is also kept in Tor traffic. Motivated by this observation, we inv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(23 citation statements)
references
References 35 publications
0
23
0
Order By: Relevance
“…Due to the complexity of encrypted traffic, most of the surveyed research focuses on supervised machine learning which required pre-training dataset to classify the traffic. The studies by [33], [36] utilized unsupervised machine learning solely for traffic clustering rather than traffic classification. Despite study by [34] managed to classify encrypted traffic using semi-supervised learning, this learning practice could be achieved with the presence of hierarchical classification approach.…”
Section: Discussion and Comparisonmentioning
confidence: 99%
See 3 more Smart Citations
“…Due to the complexity of encrypted traffic, most of the surveyed research focuses on supervised machine learning which required pre-training dataset to classify the traffic. The studies by [33], [36] utilized unsupervised machine learning solely for traffic clustering rather than traffic classification. Despite study by [34] managed to classify encrypted traffic using semi-supervised learning, this learning practice could be achieved with the presence of hierarchical classification approach.…”
Section: Discussion and Comparisonmentioning
confidence: 99%
“…These records than will be fragmented into the TCP packets before it will be send to another Tor node. These traffic layer mechanism enable features extraction of the traffic at three different levels for the machine traffic classification process as each layer has certain header information that are not encrypted [33].…”
Section: B Tlsmentioning
confidence: 99%
See 2 more Smart Citations
“…The most important challenge is that apps deliver their data predominantly using Hypertext Transfer Protocol (HTTP)/Hypertext Transfer Protocol Secure (HTTPS) and may contact the same content or ad servers, so port-based and Internet Protocol (IP)-based methods will fail. For the same reason, traditional approaches 13,14 for identifying desktop applications are too coarse grained for mobile apps. To address this problem, several recent studies [15][16][17][18][19] have been conducted and various types of identification techniques have been proposed.…”
Section: Introductionmentioning
confidence: 99%