Title :
Application of Neural Networks for Intrusion Detection in Tor Networks
Author :
Ishitaki, Taro ; Elmazi, Donald ; Yi Liu ; Oda, Tetsuya ; Barolli, Leonard ; Uchida, Kazunori
Author_Institution :
Grad. Sch. of Eng., Fukuoka Inst. of Technol. (FIT), Fukuoka, Japan
Abstract :
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor networks. In this paper, we present the application of Neural Networks (NNs) for intrusion detection in Tor networks. We used the Back propagation NN and constructed a Tor server and a Deep Web browser (client). Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then use the Back propagation NN to make the approximation. The simulation results show that our simulation system has a good approximation and can be used for intrusion detection in To networks.
Keywords :
backpropagation; computer network security; file servers; neural nets; online front-ends; telecommunication network routing; TOR network; The Onion Router; Tor server; Wireshark network analyzer; back propagation NN; computer security nonrepudiation principle; deep Web browser; intrusion detection; neural network; Approximation methods; Artificial neural networks; Intrusion detection; Neurons; Peer-to-peer computing; Servers; Deep Web; Intrusion Detection; Neural Networks; Tor Networks;
Conference_Titel :
Advanced Information Networking and Applications Workshops (WAINA), 2015 IEEE 29th International Conference on
Conference_Location :
Gwangiu
Print_ISBN :
978-1-4799-1774-7
DOI :
10.1109/WAINA.2015.136