Tor Anonymous Traffic Identification Based on Parallelizing Dilated Convolutional Network
نویسندگان
چکیده
The widespread use of the onion browser (Tor) has provided a breeding ground for proliferation cybercriminal activities and Tor anonymous traffic identification method been used to fingerprint web identify websites visited by illegals. Despite considerable progress in existing methods, problems still exist, such as high training resources required model, bias features due fast iteration singularity definition direction features. On this basis, model based on parallelizing dilated convolutions multi-feature analysis proposed paper order address these perform better website fingerprinting. A single-sample augmentation data combining multi-layer RBMs are performed, binary classification multi-classification conducted different scenarios. Our experiment shows that recognition achieves 94.37% accuracy gains significant drop time both closed-world open-world At same time, enhanced enhance robustness generalization our model. With techniques, efficiency improved we able achieve advantage bi-directional deployability communication link.
منابع مشابه
A STor: Social Network based Anonymous Communication in Tor
Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust ...
متن کاملSTor: Social Network based Anonymous Communication in Tor
Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymitynetworks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus makingthem susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based<...
متن کاملSpeeDO: Parallelizing Stochastic Gradient Descent for Deep Convolutional Neural Network
Convolutional Neural Networks (CNNs) have achieved breakthrough results on many machine learning tasks. However, training CNNs is computationally intensive. When the size of training data is large and the depth of CNNs is high, as typically required for attaining high classification accuracy, training a model can take days and even weeks. In this work, we propose SpeeDO (for Open DEEP learning ...
متن کاملResearch on Network Traffic Identification Based on Multi Layer Perceptron
In recent years, many machine learning methods have been used in network traffic identification.In order to improve the accuracy and solve some problems of network traffic identification, this paper presents a multi layer perceptron neural network-based method for network traffic identification, and parameters of multi-layer perceptron neural network are analyzed. Experimental results show that...
متن کاملAuto Adaptive Identification Algorithm Based on Network Traffic Flow
Abstract: Traffic identification is a key task for any Internet Service Provider (ISP) or network administrator. Machine learning method is an important research method on traffic identification, while impact of the asymmetry router on the traffic identification is considered, so this paper analyzes the impact of asymmetry routing on traffic identification, and proposes an effective method to d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13053243