2015
DOI: 10.5815/ijcnis.2015.07.02
|View full text |Cite
|
Sign up to set email alerts
|

A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning

Abstract: Tor is the low-latency anonymity tool and one of the prevalent used open source anonymity tools for anonymizing TCP traffic on the Internet used by around 500,000 people every day. Tor protects user's privacy against surveillance and censorship by making it extremely difficult for an observer to correlate visited websites in the Internet with the real physical-world identity. Tor accomplished that by ensuring adequate protection of Tor traffic against traffic analysis and feature extraction techniques. Further… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 16 publications
(1 reference statement)
0
8
0
Order By: Relevance
“…This is a passive method to locate obsolete botnets and fails to investigate dynamic fast-flux botnets based on sophisticated techniques. Almubayed et al [28] presented a very interesting method to extract several features from the encrypted traffic of the Tor network. These features are appropriate and can classify the Tor traffic with very high accuracy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This is a passive method to locate obsolete botnets and fails to investigate dynamic fast-flux botnets based on sophisticated techniques. Almubayed et al [28] presented a very interesting method to extract several features from the encrypted traffic of the Tor network. These features are appropriate and can classify the Tor traffic with very high accuracy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Holz et al [41] investigated a precise method to trace botnets. Almubayed et al [42] presented a method that measures the performance of several algorithms to identify the encrypted traffic in a network. Chaabane et al [43] described an in-depth study about HTTP, BitTorrent and Tor traffic and a method to identify these protocols from user's behavior.…”
Section: Related Workmentioning
confidence: 99%
“…Based on local network observer of Tor traffic dataset, [43] has analysed and found that standard HTTPS traffic (related to top monitored sites on Alexa) and Tor network has variations that could be classified using the machine learning technique. The authors generate traffic using virtual machines with two different instances.…”
Section: A Traffic Classification On Tormentioning
confidence: 99%
“…The identification process uses supervised classification based on traffic flows features. Similar to others Tor network classification [35] and [43], the chosen attributes are 23 including flow duration, flow bytes per second, flow interarrival time and flow active time. This study had been carried out on six machine algorithms with the most accurate result is J48 (C4.5) approach.…”
Section: A Traffic Classification On Tormentioning
confidence: 99%