Marionette: A Programmable Network-Traffic Obfuscation System

被引:0
|
作者
Dyer, Kevin P. [1 ]
Coull, Scott E. [2 ]
Shrimpton, Thomas [1 ]
机构
[1] Portland State Univ, Portland, OR 97207 USA
[2] RedJack LLC, Silver Spring, MD USA
关键词
WORKLOADS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a number of obfuscation systems have been developed to aid in censorship circumvention scenarios where encrypted network traffic is filtered. In this paper, we present Marionette, the first programmable network traffic obfuscation system capable of simultaneously controlling encrypted traffic features at a variety of levels, including ciphertext formats, stateful protocol semantics, and statistical properties. The behavior of the system is directed by a powerful type of probabilistic automata and specified in a user-friendly domain-specific language, which allows the user to easily adjust their obfuscation strategy to meet the unique needs of their network environment. In fact, the Marionette system is capable of emulating many existing obfuscation systems, and enables developers to explore a breadth of protocols and depth of traffic features that have, so far, been unattainable. We evaluate Marionette through a series of case studies inspired by censor capabilities demonstrated in the real-world and research literature, including passive network monitors, stateful proxies, and active probing. The results of our experiments not only show that Marionette provides outstanding flexibility and control over traffic features, but it is also capable of achieving throughput of up to 6.7Mbps when generating RFC-compliant cover traffic.
引用
收藏
页码:367 / 382
页数:16
相关论文
共 50 条
  • [1] Network Traffic Obfuscation against Traffic Classification
    Liu, Likun
    Yu, Haining
    Yu, Shilin
    Yu, Xiangzhan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [2] Network-Traffic Anomaly Detection with Incremental Majority Learning
    Huang, Shin-Ying
    Yu, Fang
    Tsaih, Rua-Huan
    Huang, Yennun
    [J]. 2015 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2015,
  • [3] Adaptive Vehicle Platooning with Joint Network-Traffic Approach
    Mahabal, Chinmay
    Fang, Hua
    Wang, Honggang
    Yang, Qing
    [J]. 2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [4] Network Traffic Obfuscation System for IIoT-Cloud Control Systems
    Lee, Yangjae
    Baek, Sung Hoon
    Seo, Jung Taek
    Park, Ki-Woong
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (03): : 4911 - 4929
  • [5] A microstate spatial-inference model for network-traffic estimation
    Fowe, Adeyemi J.
    Chan, Yupo
    [J]. TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2013, 36 : 245 - 260
  • [6] Packet-format and network-traffic transparent optical signal processing
    Kehayas, E
    Kanellos, GT
    Stampoulidis, L
    Tsiokos, D
    Pleros, N
    Guekos, G
    Avramopoulos, H
    [J]. JOURNAL OF LIGHTWAVE TECHNOLOGY, 2004, 22 (11) : 2548 - 2556
  • [7] Network Traffic Obfuscation and Automated Internet Censorship
    Dixon, Lucas
    Ristenpart, Thomas
    Shrimpton, Thomas
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (06) : 43 - 53
  • [8] Chaff Allocation and Performance for Network Traffic Obfuscation
    Ciftcioglu, Ertugrul N.
    Hardy, Rommie L.
    Chan, Kevin S.
    Scott, Lisa M.
    Oliveira, Diego F. M.
    Verma, Gunjan
    [J]. 2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1565 - 1568
  • [9] Adaptive network-traffic balancing on multi-core software networking devices
    Buh, Tomaz
    Trobec, Roman
    Ciglic, Andrej
    [J]. COMPUTER NETWORKS, 2014, 69 : 19 - 34
  • [10] Network Traffic Obfuscation: An Adversarial Machine Learning Approach
    Verma, Gunjan
    Ciftcioglu, Ertugrul
    Sheatsley, Ryan
    Chan, Kevin
    Scott, Lisa
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 413 - 418