Tor traffic analysis using Hidden Markov Models

被引:7
|
作者
Zhioua, Sami [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Informat & Comp Sci Dept, Al Dhahran 31261, Saudi Arabia
关键词
anonymity; Tor protocol; traffic analysis;
D O I
10.1002/sec.669
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tor protocol has been designed primarily to defend against traffic analysis, which threatens privacy while using Internet. In this paper, we consider a very common threat model where an attacker can observe only the local traffic between the target Tor client and the first Tor relay. We show that even with this restricted threat model, the attacker can infer relevant information about the client's traffic, in particular when exactly new circuits are constructed. This is achieved by analyzing the Tor traffic using Hidden Markov Models (HMMs). The experimental analysis shows that the proposed HMM-based approach has a high precision (93% on average) and F-measure (75% on average). The more interesting part of the paper discusses how a local attacker can identify the hops forming circuits initiated by the Tor client victim. The attack is based on sampling the timing patterns of the most probable paths and then estimating the likelihood of each one of them given a circuit construction packets sequence. The experimental analysis shows that the proposed approach has an acceptable precision (around 50%) as long as the time delay between HMM learning and the actual traffic analysis is relatively small. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1075 / 1086
页数:12
相关论文
共 50 条
  • [1] Predicting Future Traffic using Hidden Markov Models
    Chen, Zhitang
    Wen, Jiayao
    Geng, Yanhui
    [J]. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2016,
  • [2] Hidden Markov models for traffic observation
    Bruckner, Dietmar
    Sallans, Brian
    Russ, Gerhard
    [J]. 2007 5TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2007, : 1015 - +
  • [3] Traffic Lights Detection and State Estimation Using Hidden Markov Models
    Gomez, Andres E.
    Alencar, Francisco A. R.
    Prado, Paulo V.
    Osorio, Fernando S.
    Wolf, Denis E.
    [J]. 2014 IEEE INTELLIGENT VEHICLES SYMPOSIUM PROCEEDINGS, 2014, : 750 - 755
  • [4] Analysis of swallowing sounds using hidden Markov models
    Mohammad Aboofazeli
    Zahra Moussavi
    [J]. Medical & Biological Engineering & Computing, 2008, 46 : 307 - 314
  • [5] Music analysis using hidden Markov mixture models
    Qi, Yuting
    Paisley, John William.
    Carin, Lawrence
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2007, 55 (11) : 5209 - 5224
  • [6] Analysis of nanopore data using hidden Markov models
    Schreiber, Jacob
    Karplus, Kevin
    [J]. BIOINFORMATICS, 2015, 31 (12) : 1897 - 1903
  • [7] Speech defect analysis using Hidden Markov Models
    Chaloupka, Zdenek
    Uhlir, Jan
    [J]. RADIOENGINEERING, 2007, 16 (01) : 67 - 72
  • [8] Analysis of default data using hidden Markov models
    Giampieri, G
    Davis, M
    Crowder, M
    [J]. QUANTITATIVE FINANCE, 2005, 5 (01) : 27 - 34
  • [9] Analysis of swallowing sounds using hidden Markov models
    Aboofazeli, Mohammad
    Moussavi, Zahra
    [J]. MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2008, 46 (04) : 307 - 314
  • [10] Traffic Speed Prediction Using Hidden Markov Models for Czech Republic Highways
    Rapant, Lukas
    Slaninova, Katerina
    Martinovic, Jan
    Martinovic, Tomas
    [J]. AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGY AND APPLICATIONS, KES-AMSTA 2016, 2016, 58 : 187 - 196