摘要
The anonymous communication systems usually have special traffic patterns, which can be detected by censors for further disturbing or blocking. To solve this problem, we present a novel system, Deepflow, to hide anonymous communication traf- fic into the P2P streaming networks such as PPStream by using steganography. Each Deepflow node joins the PPStream network and performs like a normal PPStream client watching a live chan- nel, while embedding communication data into video packets transferred in the network. The steganographed video packets are disseminated by innocuous PPStream clients and reach the target Deepflow node. It is not necessary for Deepflow nodes to link together in the network, which prevents malicious users from sensing IP address of other Deepflow nodes. Deepflow is competent for secret chatting, transferring text documents, or publishing secret bootstrapping information for other anonymous communication systems. Comprehensive experiments in real network environments are conducted in this paper to show the security and efficiency of Deepflow.
The anonymous communication systems usually have special traffic patterns, which can be detected by censors for further disturbing or blocking. To solve this problem, we present a novel system, Deepflow, to hide anonymous communication traf- fic into the P2P streaming networks such as PPStream by using steganography. Each Deepflow node joins the PPStream network and performs like a normal PPStream client watching a live chan- nel, while embedding communication data into video packets transferred in the network. The steganographed video packets are disseminated by innocuous PPStream clients and reach the target Deepflow node. It is not necessary for Deepflow nodes to link together in the network, which prevents malicious users from sensing IP address of other Deepflow nodes. Deepflow is competent for secret chatting, transferring text documents, or publishing secret bootstrapping information for other anonymous communication systems. Comprehensive experiments in real network environments are conducted in this paper to show the security and efficiency of Deepflow.
基金
Supported by the National Natural Science Foundation of China(61300221)
the Fundamental Research Funds for the Central Universities(2014ZZ0038)
the Comprehensive Strategic Cooperation Project of Guangdong Province and Chinese Academy of Sciences(2012B090400016)
the Technology Planning Project of Guangdong Province(2012A011100005)