Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

ANFW Detection of the Tor Network Based on ResNet

View through CrossRef
Tor network is a widely used anonymous communication network that employs techniques such as packet encryption, multi-hop proxying, and traffic obfuscation to ensure the confidentiality and integrity of data transmission while concealing the communication relationship between the sender and receiver. As one of the most technologically advanced and widely used anonymous communication systems, Tor effectively resists traditional attacks such as those based on protocol analysis and traffic analysis. However, Active Network Flow Watermarking (ANFW) attacks pose a significant threat to Tor's anonymity by embedding unique watermark signals into Tor traffic, enabling the tracking of communication targets and substantially degrading Tor's effectiveness in maintaining anonymity. This paper addresses the challenge of detecting ANFW attacks within the Tor network by introducing a residual neural network (ResNet)-based detection method.  Instead of classifying specific watermark types, our approach detects the presence of watermarks in Tor traffic by analyzing behavioral changes induced by ANFW attacks. By considering both statistical and non-statistical features, we transform the detection problem into a classification task that distinguishes between normal and abnormal Tor traffic. Experimental results from real-world Tor network data confirm the effectiveness of our approach in enhancing the detection of ANFW attacks, thereby improving the anonymity provided by Tor.
Title: ANFW Detection of the Tor Network Based on ResNet
Description:
Tor network is a widely used anonymous communication network that employs techniques such as packet encryption, multi-hop proxying, and traffic obfuscation to ensure the confidentiality and integrity of data transmission while concealing the communication relationship between the sender and receiver.
As one of the most technologically advanced and widely used anonymous communication systems, Tor effectively resists traditional attacks such as those based on protocol analysis and traffic analysis.
However, Active Network Flow Watermarking (ANFW) attacks pose a significant threat to Tor's anonymity by embedding unique watermark signals into Tor traffic, enabling the tracking of communication targets and substantially degrading Tor's effectiveness in maintaining anonymity.
This paper addresses the challenge of detecting ANFW attacks within the Tor network by introducing a residual neural network (ResNet)-based detection method.
  Instead of classifying specific watermark types, our approach detects the presence of watermarks in Tor traffic by analyzing behavioral changes induced by ANFW attacks.
By considering both statistical and non-statistical features, we transform the detection problem into a classification task that distinguishes between normal and abnormal Tor traffic.
Experimental results from real-world Tor network data confirm the effectiveness of our approach in enhancing the detection of ANFW attacks, thereby improving the anonymity provided by Tor.

Related Results

On the Rock-basins in the Granite of the Dartmoor District, Devonshire
On the Rock-basins in the Granite of the Dartmoor District, Devonshire
In this Memoir the origin of Rock-basins in the Granite of Dartmoor and its vicinity is alone considered; and it is not attempted to draw therefrom any law as to the manner of the ...
MORPHOLOGICAL FEATURES OF SPIRAEA BETULIFOLIA PALL. AND ITS VARIETIES 'TOR' AND 'TOR GOLD' IN THE CONDITIONS OF THE CITY OF MOSCOW
MORPHOLOGICAL FEATURES OF SPIRAEA BETULIFOLIA PALL. AND ITS VARIETIES 'TOR' AND 'TOR GOLD' IN THE CONDITIONS OF THE CITY OF MOSCOW
Спирея березолистная – распространенный декоративный кустарник, используемый в групповых и одиночных посадках. Отличается достаточно высокой зимостойкостью, низкой засухоустойчивос...
HIBRIDISASI INTERSPESIFIK TIGA SPESIES IKAN TOR (Tor soro, Tor douronensis, DAN Tor tambroides) SECARA RESIPROKAL PADA FASE LARVA
HIBRIDISASI INTERSPESIFIK TIGA SPESIES IKAN TOR (Tor soro, Tor douronensis, DAN Tor tambroides) SECARA RESIPROKAL PADA FASE LARVA
Ikan Tor merupakan genus yang potensi dibudidayakan karena memiliki nilai ekonomis tinggi. Masalah yang ada adalah lambatnya pertumbuhan dan rendahnya tingkat sintasan benih ikan t...
Coot Bird Optimization-Based ESkip-ResNet Classification for Deepfake Detection
Coot Bird Optimization-Based ESkip-ResNet Classification for Deepfake Detection
With increased digitization comes an increase in the speed at which threats to the data are emerging. Although it can be challenging to identify, fake image creation doesn’t requir...
The assessment of Computer Vision Algorithms for the Diagnosis of Prostatic Adenocarcinoma in Surgical Specimens
The assessment of Computer Vision Algorithms for the Diagnosis of Prostatic Adenocarcinoma in Surgical Specimens
AbstractIntroductionProstatic malignancy is a major cause of morbidity and fatality among men around the globe. More than a million new cases of prostatic cancer are diagnoses annu...
Knowledge, Attitude and Decision-making of Nurses in the Resuscitation Team towards Terminating Resuscitation and Donot- Resuscitate Order
Knowledge, Attitude and Decision-making of Nurses in the Resuscitation Team towards Terminating Resuscitation and Donot- Resuscitate Order
BACKGROUND: Making appropriate decisions for cardiopulmonary resuscitation (CPR) is very challenging for healthcare providers. This study aimed to evaluate knowledge, attitude, and...
B-Tor:Anonymous Communication System Based on Consortium Blockchain
B-Tor:Anonymous Communication System Based on Consortium Blockchain
Abstract Tor, an anonymous communication system that protects the privacy of individuals, is gaining more and more attention. However, there are some problems with the Tor ...

Back to Top