2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing 2011
DOI: 10.1109/euc.2011.76
|View full text |Cite
|
Sign up to set email alerts
|

Using Traffic Analysis to Identify the Second Generation Onion Router

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…The analysis of ATs has been initially carried in private networks, e.g. with the aim of discriminating between HTTPS and Tor traffic [13]. In detail, by leveraging a dataset made of (i) regular HTTPS traffic, (ii) HTTP and (iii) HTTPS over a private Tor network, authors show that HTTP/HTTPS traffic over Tor can be detected with ≥ 93% accuracy, employing Random Forest (RF), C4.5, and AdaBoost classifiers.…”
Section: (Flat) Traffic Classification Of Anonymity Toolsmentioning
confidence: 99%
See 2 more Smart Citations
“…The analysis of ATs has been initially carried in private networks, e.g. with the aim of discriminating between HTTPS and Tor traffic [13]. In detail, by leveraging a dataset made of (i) regular HTTPS traffic, (ii) HTTP and (iii) HTTPS over a private Tor network, authors show that HTTP/HTTPS traffic over Tor can be detected with ≥ 93% accuracy, employing Random Forest (RF), C4.5, and AdaBoost classifiers.…”
Section: (Flat) Traffic Classification Of Anonymity Toolsmentioning
confidence: 99%
“…4 According to the above dataset description, we tackle the problem of classification of ATs traffic assuming that we are in the presence of AT traffic only, similarly to [5]. The depicted scenario refers to a context where an upstream classifier has been able to separate AT traffic from clear or standard-encrypted one (e.g., as shown by [13] for Tor network). Hence, the aim of the proposed approach is to assess discrimination of anonymity services and related applications once this AT traffic has been separated from other traffic.…”
Section: Dataset Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Differentiate Tor Traffic from Encrypted Traffic: Barker et al [51] showed that traffic from the Tor network can be differentiated form encrypted traffic in the network. They captured regular HTTPS, Tor HTTPS and HTTP traffic routed through Tor and analyzed their packet sizes and developed an unsupervised machine learning (ML) classifier that operates only on packet size attribute with 97.54% true positive (TP) and 1.06% false positive (FP) rates.…”
Section: Tor Traffic Detectionmentioning
confidence: 99%
“…Barker et al [51] collected Tor network traces by developing a complete Tor setup. Firefox running on Ubuntu was used on all machines.…”
Section: Private Setup Connected With Tormentioning
confidence: 99%