Affiliation:
1. Faculty of Computer Engineering, Charles W. Davidson College of Engineering, San Jose State University, San Jose, CA 95192, USA
Abstract
Anonymous networks, which aim primarily to protect user identities, have gained prominence as tools for enhancing network security and anonymity. Nonetheless, these networks have become a platform for adversarial affairs and sources of suspicious attack traffic. To defend against unpredictable adversaries on the Internet, detecting anonymous network traffic has emerged as a necessity. Many supervised approaches to identify anonymous traffic have harnessed machine learning strategies. However, many require access to engineered datasets and complex architectures to extract the desired information. Due to the resistance of anonymous network traffic to traffic analysis and the scarcity of publicly available datasets, those approaches may need to improve their training efficiency and achieve a higher performance when it comes to anonymous traffic detection. This study utilizes feature engineering techniques to extract pattern information and rank the feature importance of the static traces of anonymous traffic. To leverage these pattern attributes effectively, we developed a reinforcement learning framework that encompasses four key components: states, actions, rewards, and state transitions. A lightweight system is devised to classify anonymous and non-anonymous network traffic. Subsequently, two fine-tuned thresholds are proposed to substitute the traditional labels in a binary classification system. The system will identify anonymous network traffic without reliance on labeled data. The experimental results underscore that the system can identify anonymous traffic with an accuracy rate exceeding 80% (when based on pattern information).
Reference31 articles.
1. Dingledine, R., Mathewson, N., and Syverson, P. (2004, January 9–13). Tor: The second-generation onion router. Proceedings of the 13th Conference on USENIX Security Symposium, San Diego, CA, USA.
2. Parizi, R.M., Homayoun, S., Yazdinejad, A., Dehghantanha, A., and Choo, K.R. (2019, January 5–8). Integrating privacy enhancing techniques into blockchains using sidechains. Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), Edmonton, AB, Canada.
3. Peng, K. (2023, January 10–14). How secure are the main real-world mix networks—Case studies to explore vulnerabilities and usability. Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, Melbourne, Australia.
4. (2023, December 01). The Invisible Internet Project. Available online: https://geti2p.net/en/.
5. Behavior Analysis of Long-term Cyber Attacks in the Darknet;Ban;Neural Inf. Process.,2012