期刊文献+

基于时频分析和图卷积神经网络的Tor网络流量关联方法

Traffic Correlation Method for Tor Network Based on Time-Frequency Analysis and GCN
下载PDF
导出
摘要 洋葱路由(Tor, the onion route)网络加密流的关联分析是其追踪溯源的核心技术之一;针对当前基于深度学习的流关联方法存在的时间特征不可靠且初级特征表征能力不强的问题,提出了一种基于时频分析和图卷积神经网络的关联分析方法,该方法使用Tor网络流量的数据包长度信息作为原始特征序列,将数据包的包长度序列通过时频分布函数映射到时频域,并进一步将其嵌入为图结构数据,同时使用图卷积神经网络提取高阶特征,最后将得到的高阶特征输入三元组网络以实现相似流量的关联。实验结果表明误报率为0.1%时,所提方法的关联准确率可达到83.4%,明显优于已有的DeepCorr和Attcorr方法。 The correlation analysis of encrypted flows in the Tor network is one of core techniques for its traceability.Aimed at unreliable temporal features and weak initial feature representation in current flow correlation methods based on deep learning,a correlation analysis method based on time-frequency analysis and graph convolutional network(GCN)is proposed.The method utilizes the packet length information of Tor network traffic as a raw feature sequence,a time-frequency distribution function is used to map the packet length sequence to the time-frequency domain,and further embed it into the graph-structured data,its high-order features are extracted by using the graph convolutional neural network.Finally,the obtained high-order features are then input into triplet network to achieve the correlation of similar flows.Experimental results show that with a false positive rate of 0.1%,the correlation accuracy of the proposed method achieves by 83.4%,significantly outperforming the existing DeepCorr and Attcorr methods.
作者 张凯杰 刘光杰 翟江涛 孟玉飞 ZHANG Kaijie;LIU Guangjie;ZHAI Jiangtao;MENG Yufei(Key Laboratory of Intelligent Support Technology for Complex Environments,Ministry of Education,Nanjing 210044,China;School of Electronic&Information Engineering,Nanjing University of Information Science&Technology,Nanjing 210044,China)
出处 《网络空间安全科学学报》 2023年第3期52-58,共7页 Journal of Cybersecurity
基金 国家重点研发计划(2021QY0700) 国家自然科学基金(U21B2003,62072250)。
关键词 流关联 时频分析 图卷积神经网络 匿名通信网络 Tor网络 flow correlation time-frequency analysis GCN anonymous communication network Tor network
  • 相关文献

参考文献2

二级参考文献29

  • 1X.Fu,,Y.Zhu,,B.Graham,et al."On Flow Marking Attacks in Wireless Anonymous Communication Networks". Proceedings of the IEEE International Conference on Distributed Computing Systems(ICDCS) . 2005
  • 2Pfitzrnann A,Kohntopp M.Anonymity, Unobservability, and Pseudonymity: A Proposal for Terminology. Designing Privacy Enhancing Technologies:Int’1 Workshop on Design Issues in Anonymity and Unobservability . 2000
  • 3Chaum D.Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM . 1981
  • 4Reiter MK,Rubin AD.Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security . 1998
  • 5Reed M G,Syverson P F,Goldschlag D M.Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications . 1998
  • 6Wang X,Reeves D S.Robust correlation of encrypted attack traf-fic through stepping stones by manipulation of inter-packet delays. Proceedings of the 2003 ACM Conference on Computer andCommunications Security . 2003
  • 7ZHANG Yin,PAXSON V.Detecting stepping stones. Proc of the9th USENIX Security Symposium . 2000
  • 8Anja Jerichow,Jan Muller,A. Pfitzmann, at al.Real-Time MIXes:A bandwidth-Efficient Anonymity Protocol. IEEE Journal on Seclected Areas in Communications . 1998
  • 9Yong G,Xinwen F,et al.NetCamo: Camouflaging Network traffic for Qos-Guaranteed Mission Critical Applications. IEEE Transactions on Systems Man and Cybernetics . 2001
  • 10Roger Dingledine,Nick Mathewson,Paul Syverson.Tor:The Second-Generation Onion Router. Usenix Security 2004 . 20048

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部