Skip to main content
Log in

An Approach for Detecting Anonymized Traffic: Orbot as Case Study

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

This work studies Orbot, an anonymous overlay network used to browse the Internet. Its ease of use has attracted all kinds of people, including ordinary Internet users who want to avoid being profiled to bypass censorship, government intelligence agencies that need to do operations on the Internet without being detected and companies who do not want to reveal information to their competitors. This article aims to study, analyze, and mostly identify the Orbot traffic, since much of it is used for illegal purposes. A method of identification of the anonymous network is established by examining the traffic to identify clues. The method used to detect the use of the Orbot application in the network is based on the creation of the rules with Snort IDS from the analysis of the packets in Wireshark analyzer. The encryption aspect of the flow of this anonymous network brings us to a deep packet inspection (DPI). A set of Snort rules were developed as a proof of concept for the proposed Orbot detection approach. Our traffic detection methodology has demonstrated that it can detect Orbot connections in real time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.
Fig. 10.
Fig. 11.

Similar content being viewed by others

REFERENCES

  1. Neupane, K., Haddad, R., and Chen, L., Next generation firewall for network security: A survey, SouthEastCon, St. Petersburg, Fla., 2018, IEEE, 2018, pp. 1–6.  https://doi.org/10.1109/SECON.2018.8478973

  2. Dantas, B., Carvalho, P., Lima, S.R., Silva, J.M., Detection of anonymised traffic: Tor as case study, Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2020, ruSMART 2020, Galinina, O., Andreev, S., Balandin, S., and Koucheryavy, Y., Eds., Lecture Notes in Computer Science, vol. 12526, Cham: Springer, 2020, pp. 95–109.  https://doi.org/10.1007/978-3-030-65729-1_9

    Book  Google Scholar 

  3. Merouane, M., An approach for detecting and preventing DDoS attacks in campus, Autom. Control Comput. Sci., 2017, vol. 51, pp. 13–23.  https://doi.org/10.3103/S0146411616060043

    Article  Google Scholar 

  4. Saputra, F.A., Nadhori, I.U., and Barry, B.F., Detecting and blocking onion router traffic using deep packet inspection, Int. Electronics Symp. (IES), Denpasar, Indonesia, 2016, IEEE, 2016, pp. 283–288.  https://doi.org/10.1109/ELECSYM.2016.7861018

  5. Hansen, R., First glance: An introductory analysis of network forensics of Tor, Ann. ADFSL Conf. on Digital Forensics, Security and Law, Richmond, Va., 2013, pp. 105–118.

  6. Merouane, M., Interception of P2P traffic in a campus network, Rom. J. Inf. Technol. Autom. Control, 2019, vol. 29, no. 2, pp. 21–34.  https://doi.org/10.33436/v29i2y201902

    Article  Google Scholar 

  7. Merouane, M., Experimental platform for teaching denial of services attacks, Int. J. Comput. Sci. Inf. Secur., 2016, vol. 14, no. 11.

  8. Chetry, A. and Sharma, U., Dark web Activity on Tor—Investigation challenges and retrieval of memory artifacts, International Conference on Innovative Computing and Communications, Gupta, D., Khanna, A., Bhattacharyya, S., Hassanien, A.E., Anand, S., and Jaiswal, A., Eds., Advances in Intelligent Systems and Computing, vol. 1165, Singapore: Springer, 2021, pp. 953–964.  https://doi.org/10.1007/978-981-15-5113-0_80

  9. Huang, Y., Lee, C., and Hsu, F., The research of attacking TOR network users, Int. Conf. on Security with Intelligent Computing and Big-Data Services, 2020, pp. 35–38.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehdi Merouane.

Ethics declarations

The authors declare that they have no conflicts of interest.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mehdi Merouane An Approach for Detecting Anonymized Traffic: Orbot as Case Study. Aut. Control Comp. Sci. 56, 45–57 (2022). https://doi.org/10.3103/S0146411622010072

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411622010072

Keywords:

Navigation