Online identification of Tor anonymous communication traffic

33Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Abuse of anonymous communication systems has introduced new challenges into network administration. The effective identification of anonymous communication traffic is a prerequisite to prevent such abuse; thus, this is fundamentally important for both theoretical researches and practical applications. Existing researches mainly focus on the confirmation of anonymous communication relationship and cannot be used to identify and block anonymous communication traffic. To solve this problem, the operation mechanism is deeply analyzed and traffic characteristics are summarized for the widely used Tor anonymous communication system. On this basis, a TLS fingerprint-based and packet-size distributions based methods are proposed to identify Tor anonymous communication traffic, respectively. The advantages, disadvantages and applicability of these two methods are analyzed and discussed in detail, and are validated by CAIDA dataset and online deployment. Experimental results prove that both methods are effective in identifying Tor anonymous communication traffic. © Copyright 2013, Institute of Software, the Chinese Academy of Sciences. All rights reserved.

Cite

CITATION STYLE

APA

He, G. F., Yang, M., Luo, J. Z., & Zhang, L. (2013). Online identification of Tor anonymous communication traffic. Ruan Jian Xue Bao/Journal of Software, 24(3), 540–556. https://doi.org/10.3724/SP.J.1001.2013.04253

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free