skip to main content
10.1145/3503047.3503087acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaissConference Proceedingsconference-collections
research-article

A Survey on Anonymous Communication Systems Traffic Identification and Classification

Authors Info & Claims
Published:19 January 2022Publication History
First page image

References

  1. ]Mittal P, Olumofin F G, Troncoso C, PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval[C]//USENIX Security Symposium. 2011: 31.Google ScholarGoogle Scholar
  2. Clarke I, Sandberg O, Wiley B, Freenet: A distributed anonymous information storage and retrieval system[C]//Designing privacy enhancing technologies. Springer, Berlin, Heidelberg, 2001: 46-66.Google ScholarGoogle Scholar
  3. Zantout B, Haraty R. I2P data communication system[C]//Proceedings of ICN. 2011: 401-409.Google ScholarGoogle Scholar
  4. Junzhou L, Ming Y, Zhen L, Anonymous communication and darknet: A survey[J]. Journal of Computer Research and Development, 2019, 56(1): 103.Google ScholarGoogle Scholar
  5. Azzouna N B, Guillemin F. Analysis of ADSL traffic on an IP backbone link[C]//GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489). IEEE, 2003, 7: 3742-3746.Google ScholarGoogle ScholarCross RefCross Ref
  6. Wang W, Zhu M, Wang J, End-to-end encrypted traffic classification with one-dimensional convolution neural networks[C]//2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017: 43-48.Google ScholarGoogle Scholar
  7. Cao Z, Xiong G, Zhao Y, A survey on encrypted traffic classification[C]//International Conference on Applications and Techniques in Information Security. Springer, Berlin, Heidelberg, 2014: 73-81.Google ScholarGoogle Scholar
  8. Pacheco F, Exposito E, Gineste M, Towards the deployment of machine learning solutions in network traffic classification: A systematic survey[J]. IEEE Communications Surveys & Tutorials, 2018, 21(2): 1988-2014.Google ScholarGoogle ScholarCross RefCross Ref
  9. Aminuddin M, Zaaba Z F, Singh M K M, A survey on tor encrypted traffic monitoring[J]. International Journal of Advanced Computer Science and Applications, 2018, 9(8): 113-120.Google ScholarGoogle ScholarCross RefCross Ref
  10. Liu Z, Wang R, Japkowicz N, Mobile app traffic flow feature extraction and selection for improving classification robustness[J]. Journal of Network and Computer Applications, 2019, 125: 190-208.Google ScholarGoogle ScholarCross RefCross Ref
  11. Tian G, Duan Z, Baumeister T, A traceback attack on freenet[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 14(3): 294-307Google ScholarGoogle Scholar
  12. Habibi Lashkari A, Kaur G, Rahali A. DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning[C]//2020 the 10th International Conference on Communication and Network Security. 2020: 1-13.Google ScholarGoogle Scholar
  13. Salman O, Elhajj I H, Kayssi A, A review on machine learning–based approaches for internet traffic classification[J]. Annals of Telecommunications, 2020, 75(11): 673-710.Google ScholarGoogle ScholarCross RefCross Ref
  14. Rezaei S, Liu X. Deep learning for encrypted traffic classification: An overview[J]. IEEE communications magazine, 2019, 57(5): 76-81Google ScholarGoogle ScholarCross RefCross Ref
  15. Lashkari A H, Draper-Gil G, Mamun M S I, Characterization of tor traffic using time based features[C]//ICISSp. 2017: 253-262.Google ScholarGoogle Scholar
  16. Yao Z, Ge J, Wu Y, Meek-based tor traffic identification with hidden markov model[C]//2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 2018: 335-340.Google ScholarGoogle Scholar
  17. Burschka S, Dupasquier B. Tranalyzer: Versatile high performance network traffic analyser[C]//2016 IEEE symposium series on computational intelligence (SSCI). IEEE, 2016: 1-8Google ScholarGoogle Scholar
  18. Rao Z, Niu W, Zhang X S, Tor anonymous traffic identification based on gravitational clustering[J]. Peer-to-Peer Networking and Applications, 2018, 11(3): 592-601.Google ScholarGoogle ScholarCross RefCross Ref
  19. Montieri A, Ciuonzo D, Aceto G, Anonymity services tor, i2p, jondonym: classifying in the dark (web)[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 17(3): 662-675.Google ScholarGoogle ScholarCross RefCross Ref
  20. Shahbar K, Zincir-Heywood A N. How far can we push flow analysis to identify encrypted anonymity network traffic?[C]//NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2018: 1-6.Google ScholarGoogle Scholar
  21. Kim M, Anpalagan A. Tor traffic classification from raw packet header using convolutional neural network[C]//2018 1st IEEE International Conference on Knowledge Innovation and Invention (ICKII). IEEE, 2018: 187-190.Google ScholarGoogle Scholar
  22. Cai Z, Jiang B, Lu Z, isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting[C]//2019 International Joint Conference on Neural Networks (IJCNN). IEEE, 2019: 1-8.Google ScholarGoogle Scholar
  23. Aminuddin M, Zaaba Z F, Singh M K M, A survey on tor encrypted traffic monitoring[J]. International Journal of Advanced Computer Science and Applications, 2018, 9(8): 113-120.Google ScholarGoogle ScholarCross RefCross Ref
  24. Rimmer V, Preuveneers D, Juarez M, Automated website fingerprinting through deep learning[J]. arXiv preprint arXiv:1708.06376, 2017Google ScholarGoogle Scholar
  25. Timpanaro J P, Isabelle C, Olivier F. Monitoring the I2P network[D]. Inria, 2011.Google ScholarGoogle Scholar
  26. Timpanaro J P, Chrisment I, Festor O. A bird's eye view on the I2P anonymous file-sharing environment[C]//International Conference on Network and System Security. Springer, Berlin, Heidelberg, 2012: 135-148.Google ScholarGoogle Scholar
  27. http://www.i2project.net/de/docs/transport/ntcpGoogle ScholarGoogle Scholar
  28. Timpanaro J P, Chrisment I, Festor O. Improving content availability in the I2P anonymous file-sharing environment[C]//International Symposium on Cyberspace Safety and Security. Springer, Berlin, Heidelberg, 2012: 77-92Google ScholarGoogle Scholar
  29. Timpanaro J P, Chrisment I, Festor O. Monitoring anonymous P2P file-sharing systems[C]//IEEE P2P 2013 Proceedings. IEEE, 2013: 1-2.Google ScholarGoogle Scholar
  30. Haraty R A, Assi M, Rahal I. A Systematic Review of Anonymous Communication Systems[C]//ICEIS (2). 2017: 211-220.Google ScholarGoogle Scholar
  31. Levine B N, Liberatore M, Lynn B, Statistical detection of downloaders in freenet[C]//CEUR Workshop Proceedings. 2017.Google ScholarGoogle Scholar
  32. Timpanaro J P, Chrisment I, Festor O. Group-based characterization for the i2p anonymous file-sharing environment[C]//2014 6th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2014: 1-5.Google ScholarGoogle Scholar
  33. Timpanaro J P, Cholez T, Chrisment I, Evaluation of the anonymous I2P network's design choices against performance and security[C]//2015 International Conference on Information Systems Security and Privacy (ICISSP). IEEE, 2015: 1-10.Google ScholarGoogle Scholar
  34. Haraty R A, Assi M, Rahal I. A Systematic Review of Anonymous Communication Systems[C]//ICEIS (2). 2017: 211-220.Google ScholarGoogle Scholar
  35. Tian G, Duan Z, Baumeister T, A traceback attack on freenet[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 14(3): 294-307.Google ScholarGoogle Scholar
  36. Nasr M, Bahramali A, Houmansadr A. Deepcorr: Strong flow correlation attacks on Tor using deep learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018: 1962-1976.Google ScholarGoogle Scholar
  37. Zincir-Heywood K S A N. Anon17: Network Traffic Dataset of Anonymity Services[J].Google ScholarGoogle Scholar
  38. Habibi Lashkari A, Kaur G, Rahali A. DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning[C]//2020 the 10th International Conference on Communication and Network Security. 2020: 1-13.Google ScholarGoogle Scholar

Index Terms

  1. A Survey on Anonymous Communication Systems Traffic Identification and Classification
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        AISS '21: Proceedings of the 3rd International Conference on Advanced Information Science and System
        November 2021
        526 pages
        ISBN:9781450385862
        DOI:10.1145/3503047

        Copyright © 2021 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 January 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate41of95submissions,43%
      • Article Metrics

        • Downloads (Last 12 months)48
        • Downloads (Last 6 weeks)4

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format