A user prediction and identification system for tor networks using ARIMA model

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor networks. In this paper, we present the application of Autoregression Integrated Moving Average (ARIMA) for prediction of user behavior in Tor networks. We constructed a Tor server and a Deep Web browser (Tor client) in our laboratory. Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then used the ARIMA model to make the prediction. The simulation results show that proposed system has a good prediction of user behavior in Tor networks.

Cite

CITATION STYLE

APA

Oda, T., Cuka, M., Obukata, R., Ikeda, M., & Barolli, L. (2018). A user prediction and identification system for tor networks using ARIMA model. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 6, pp. 89–97). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-59463-7_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free