A Survey on Tor Encrypted Traffic Monitoring

被引:0
|
作者
Aminuddin, Mohamad Amar Irsyad Mohd [1 ]
Zaaba, Zarul Fitri [1 ]
Singh, Manmeet Kaur Mahinderjit [1 ]
Singh, Darshan Singh Mahinder [2 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, Usm 11800, Pulau Pinang, Malaysia
[2] Univ Sains Malaysia, Sch Comp Sci, Ctr Drug Res, Usm 11800, Pulau Pinang, Malaysia
关键词
Encrypted traffic monitoring; Tor; machine learning; security; survey;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Tor (The Onion Router) is an anonymity tool that is widely used worldwide. Tor protect its user privacy against surveillance and censorship using strong encryption and obfuscation techniques which makes it extremely difficult to monitor and identify users' activity on the Tor network. It also implements strong defense to protect the users against traffic features extraction and website fingerprinting. However, the strong anonymity also became the heaven for criminal to avoid network tracing. Therefore, numerous of research has been performed on encrypted traffic analyzing and classification using machine learning techniques. This paper presents survey on existing approaches for classification of Tor and other encrypted traffic. There is preliminary discussion on machine learning approaches and Tor network. Next, there are comparison of the surveyed traffic classification and discussion on their classification properties.
引用
收藏
页码:113 / 120
页数:8
相关论文
共 50 条
  • [31] A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
    Oh, Chaeyeon
    Ha, Joonseo
    Roh, Heejun
    APPLIED SCIENCES-BASEL, 2022, 12 (01):
  • [32] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960
  • [33] Is Encrypted ClientHello a Challenge for Traffic Classification?
    Shamsimukhametov, Danil
    Kurapov, Anton
    Liubogoshchev, Mikhail
    Khorov, Evgeny
    IEEE ACCESS, 2022, 10 : 77883 - 77897
  • [34] The seven myths of encrypted traffic scanning
    Lueck M.
    Network Security, 2021, 2021 (07) : 9 - 12
  • [35] Detecting Ransomware in Encrypted Web Traffic
    Modi, Jaimin
    Traore, Issa
    Ghaleb, Asem
    Ganame, Karim
    Ahmed, Sherif
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 345 - 353
  • [36] Network Intrusion Detection in Encrypted Traffic
    Papadogiannaki, Eva
    Tsirantonakis, Giorgos
    Ioannidis, Sotiris
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [37] Feature analysis of encrypted malicious traffic
    Shekhawat, Anish Singh
    Di Troia, Fabio
    Stamp, Mark
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 125 : 130 - 141
  • [38] In-Network QoE and KPI Monitoring of Mobile YouTube Traffic: Insights for Encrypted iOS Flows
    Orsolic, Irena
    Rebernjak, Petra
    Suznjevic, Mirko
    Skorin-Kapov, Lea
    2018 14TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2018, : 233 - 239
  • [39] A Survey of Unmanned Aerial Vehicles (UAVs) for Traffic Monitoring
    Kanistras, Konstantinos
    Martins, Goncalo
    Rutherford, Matthew J.
    Valavanis, Kimon P.
    2013 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS), 2013, : 221 - 234
  • [40] A Survey of Different Stages for Monitoring Traffic Rule Violation
    Aarthi, R.
    Arunkumar, C.
    Padmavathi, S.
    GLOBAL TRENDS IN INFORMATION SYSTEMS AND SOFTWARE APPLICATIONS, PT 2, 2012, 270 : 566 - 573