DocumentCode
229360
Title
Benchmarking two techniques for Tor classification: Flow level and circuit level classification
Author
Shahbar, Khalid ; Zincir-Heywood, A. Nur
Author_Institution
Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada
fYear
2014
fDate
9-12 Dec. 2014
Firstpage
1
Lastpage
8
Abstract
Recently, many Internet users, who seek anonymity, use Tor, which is one of the most popular anonymity software solutions. Tor provides this anonymity by hiding the identity of the user from the destination that the user aims to reach. It also hides the user activities into encrypted cells. In this work, we investigate up to what level we can define what the user in Tor is doing. To this end, we extended on the previous work to classify the user activities using information extracted from Tor circuits and cells. Moreover, we developed a classification system to identify user activities based on traffic flow features. Our results show that flow based classification can reach up to the accuracy of the cell level classification as well as being more flexible.
Keywords
computer network security; cryptography; data encapsulation; online front-ends; pattern classification; public domain software; steganography; telephone traffic; Internet user anonymity; Tor cells; Tor circuits; Tor classification; anonymity software solutions; cell level classification; circuit level classification; encrypted cells; flow based classification; flow level; information extraction; traffic flow features; user activity classification; user activity hiding; user identity hiding; Accuracy; Classification algorithms; Cryptography; Downlink; IP networks; Relays; Uplink; Tor Circuits; Tor traffic classification; Traffic Flow;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence in Cyber Security (CICS), 2014 IEEE Symposium on
Conference_Location
Orlando, FL
Type
conf
DOI
10.1109/CICYBS.2014.7013368
Filename
7013368
Link To Document