Tor Anonymous Traffic Identification Based on Parallelizing Dilated Convolutional Network

نویسندگان

چکیده

The widespread use of the onion browser (Tor) has provided a breeding ground for proliferation cybercriminal activities and Tor anonymous traffic identification method been used to fingerprint web identify websites visited by illegals. Despite considerable progress in existing methods, problems still exist, such as high training resources required model, bias features due fast iteration singularity definition direction features. On this basis, model based on parallelizing dilated convolutions multi-feature analysis proposed paper order address these perform better website fingerprinting. A single-sample augmentation data combining multi-layer RBMs are performed, binary classification multi-classification conducted different scenarios. Our experiment shows that recognition achieves 94.37% accuracy gains significant drop time both closed-world open-world At same time, enhanced enhance robustness generalization our model. With techniques, efficiency improved we able achieve advantage bi-directional deployability communication link.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A STor: Social Network based Anonymous Communication in Tor

Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust ...

متن کامل

STor: Social Network based Anonymous Communication in Tor

Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymitynetworks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus makingthem susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based<...

متن کامل

SpeeDO: Parallelizing Stochastic Gradient Descent for Deep Convolutional Neural Network

Convolutional Neural Networks (CNNs) have achieved breakthrough results on many machine learning tasks. However, training CNNs is computationally intensive. When the size of training data is large and the depth of CNNs is high, as typically required for attaining high classification accuracy, training a model can take days and even weeks. In this work, we propose SpeeDO (for Open DEEP learning ...

متن کامل

Research on Network Traffic Identification Based on Multi Layer Perceptron

In recent years, many machine learning methods have been used in network traffic identification.In order to improve the accuracy and solve some problems of network traffic identification, this paper presents a multi layer perceptron neural network-based method for network traffic identification, and parameters of multi-layer perceptron neural network are analyzed. Experimental results show that...

متن کامل

Auto Adaptive Identification Algorithm Based on Network Traffic Flow

Abstract: Traffic identification is a key task for any Internet Service Provider (ISP) or network administrator. Machine learning method is an important research method on traffic identification, while impact of the asymmetry router on the traffic identification is considered, so this paper analyzes the impact of asymmetry routing on traffic identification, and proposes an effective method to d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13053243