Method of application classification in Tor anonymous communication flow

A technology for anonymous communication and application classification, applied in the research field of anonymous communication and traffic analysis, it can solve problems such as abuse and network security threats, and achieve the effect of fast running speed, less network load and good classification effect.

Active Publication Date: 2014-11-05
南京市公安局
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The anonymous communication system originally used to protect user privacy information is being abused by attackers, posing a huge threat to network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of application classification in Tor anonymous communication flow
  • Method of application classification in Tor anonymous communication flow
  • Method of application classification in Tor anonymous communication flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] This method mainly solves the problem of obtaining upper-layer application type information in Tor anonymous communication traffic, and involves related technologies such as feature selection, sample preprocessing, and traffic modeling. This method first uses Tor's data packet scheduling mechanism to define the concept of flow bursts, and uses the volume and direction of flow bursts as classification features. Then the data samples were preprocessed based on the K-means clustering algorithm and the multiple sequence alignment algorithm, and the overfitting and length inconsistencies of the data samples were solved by numerical symbolization and gap insertion. Finally, using the Profile Hidden Markov Model to model the uplink and downlink Tor anonymous communication traffic of different applications, a heuristic algorithm is proposed to quickly establish the Profile Hidden Markov Model. In the specific classification, the characteristics of the network traffic to be clas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method of application classification in Tor anonymous communication flow, which mainly solves the problem of acquisition of upper-layer application type information in the Tor anonymous communication flow and relates to the correlation technique, such as feature selection, sampling preprocessing and flow modeling. The method comprises the following steps of: firstly, defining a concept of a flow burst section by utilizing a data packet scheduling mechanism of Tor, and serving a volume value and a direction of the flow burst section as classification features; secondly, preprocessing a data sample based on a K-means clustering algorithm and a multiple sequence alignment algorithm, and solving the problems of over-fitting and inconsistent length of the data sample through the manners of value symbolization and gap insertion; and lastly, respectively modeling uplink Tor anonymous communication flow and downlink Tor anonymous communication flow of different applications by utilizing a Profile hidden Markov model, providing a heuristic algorithm to establish the Profile hidden Markov model quickly, during specific classification, substituting features of network flow to be classified into the Profile hidden Markov models of different applications, respectively figuring up probabilities corresponding to an uplink flow model and a downlink flow model, and deciding the upper-layer application type included by the Tor anonymous communication flow to be classified through a maximum joint probability value.

Description

technical field [0001] The present invention is a classification method of Tor anonymous communication traffic application, utilizes related technologies such as feature selection, sample preprocessing and traffic modeling, and relates to network security, especially the research fields of anonymous communication and traffic analysis. Background technique [0002] With the rapid development and widespread use of the Internet and mobile Internet, the network has been integrated into every aspect of people's daily life. At the same time, the security and privacy issues brought about by network communication have also received more and more attention. In order to protect the privacy information of network users, researchers have designed a variety of anonymous communication schemes such as the onion routing protocol, and developed some practical anonymous communication systems on this basis, such as Tor, JAP, I2P, etc. But the widespread use of anonymous communication systems ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 蒋平许勇赵琛史明文汪兆斌
Owner 南京市公安局
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products