期刊文献+

Deepflow: Hiding Anonymous Communication Traffic in P2P Streaming Networks 被引量:2

Deepflow: Hiding Anonymous Communication Traffic in P2P Streaming Networks
原文传递
导出
摘要 The anonymous communication systems usually have special traffic patterns, which can be detected by censors for further disturbing or blocking. To solve this problem, we present a novel system, Deepflow, to hide anonymous communication traf- fic into the P2P streaming networks such as PPStream by using steganography. Each Deepflow node joins the PPStream network and performs like a normal PPStream client watching a live chan- nel, while embedding communication data into video packets transferred in the network. The steganographed video packets are disseminated by innocuous PPStream clients and reach the target Deepflow node. It is not necessary for Deepflow nodes to link together in the network, which prevents malicious users from sensing IP address of other Deepflow nodes. Deepflow is competent for secret chatting, transferring text documents, or publishing secret bootstrapping information for other anonymous communication systems. Comprehensive experiments in real network environments are conducted in this paper to show the security and efficiency of Deepflow. The anonymous communication systems usually have special traffic patterns, which can be detected by censors for further disturbing or blocking. To solve this problem, we present a novel system, Deepflow, to hide anonymous communication traf- fic into the P2P streaming networks such as PPStream by using steganography. Each Deepflow node joins the PPStream network and performs like a normal PPStream client watching a live chan- nel, while embedding communication data into video packets transferred in the network. The steganographed video packets are disseminated by innocuous PPStream clients and reach the target Deepflow node. It is not necessary for Deepflow nodes to link together in the network, which prevents malicious users from sensing IP address of other Deepflow nodes. Deepflow is competent for secret chatting, transferring text documents, or publishing secret bootstrapping information for other anonymous communication systems. Comprehensive experiments in real network environments are conducted in this paper to show the security and efficiency of Deepflow.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期417-425,共9页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China(61300221) the Fundamental Research Funds for the Central Universities(2014ZZ0038) the Comprehensive Strategic Cooperation Project of Guangdong Province and Chinese Academy of Sciences(2012B090400016) the Technology Planning Project of Guangdong Province(2012A011100005)
关键词 ANONYMITY anticensorship PEER-TO-PEER STREAMING anonymity anticensorship Peer-to-Peer streaming
  • 相关文献

参考文献25

  • 1Burnett S , Feamster N. Making Sense of Internet Censorship: A new frontier for Internet measurement [J], Computer Communication Review, 2013, 43(3): 84-89.
  • 2Dingledine R, Mathewson N, Syverson P. Tor: The second-generation onion router [C]// Proc 13 th USENIX Security Symposium. San Diego: USENIX Press, 2004: 303-320.
  • 3Reiter M, Rubin A. Crowds: Anonymity for Web transactions [J], ACM Trans Information and System Security, 1998, 1(1): 66-92.
  • 4Freedman M, Morris R. Tarzan: A peer-to-peer anonymizing network layer [C]// Proc 9th ACM Conference Computer and Communications Security. Washington D C: ACM Press, 2002: 193-206.
  • 5Rennhard M, Plattner B. Introducing morphmix: Peer-to-Peer based anonymous Internet usage with collusion detection [C]// Proc ACM Workshop on Privacy in the Electronic Society. Washington D C: ACM Press, 2002: 91-102.
  • 6Nambiar A, Wright M. Salsa: A structured approach to large-scale anonymity [C]// Proc \3th ACM Conference Computer and Communications Security. Alexandria: ACM Press, 2006: 17-26.
  • 7Mittal P, Borisov N. Shadowwalker: Peer-to-Peer anonymous communication using redundant structured topologies [C] IIProc 16th ACM Conference Computer and Communications Security. Chicago: ACM Press, 2009: 161-172.
  • 8Panchenko A, Richter S, Rache A. Nisan: Network information service for anonymization networks [C]// Proc 16th ACM Conference Computer and Communications Security. Chicago: ACM Press, 2009: 141-150.
  • 9McLachlan J, Tran A, Hopper N, et al. Scalable onion routing with Torsk [C]// Proc 16th ACM Conference Computer and Communications Security. Chicago: ACM Press, 2009: 590-599.
  • 10Liu Y, Han J, Wang J. Rumor Riding: Anonymizing unstructured Peer-to-Peer systems [J], IEEE Trans Parallel and Distributed Systems, 2011, 22(3): 464-475.

同被引文献9

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部