The anonymous communication systems usually have special traffic patterns, which can be detected by censors for further disturbing or blocking. To solve this problem, we present a novel system, Deepflow, to hide anony...The anonymous communication systems usually have special traffic patterns, which can be detected by censors for further disturbing or blocking. To solve this problem, we present a novel system, Deepflow, to hide anonymous communication traf- fic into the P2P streaming networks such as PPStream by using steganography. Each Deepflow node joins the PPStream network and performs like a normal PPStream client watching a live chan- nel, while embedding communication data into video packets transferred in the network. The steganographed video packets are disseminated by innocuous PPStream clients and reach the target Deepflow node. It is not necessary for Deepflow nodes to link together in the network, which prevents malicious users from sensing IP address of other Deepflow nodes. Deepflow is competent for secret chatting, transferring text documents, or publishing secret bootstrapping information for other anonymous communication systems. Comprehensive experiments in real network environments are conducted in this paper to show the security and efficiency of Deepflow.展开更多
基金Supported by the National Natural Science Foundation of China(61300221)the Fundamental Research Funds for the Central Universities(2014ZZ0038)+1 种基金the Comprehensive Strategic Cooperation Project of Guangdong Province and Chinese Academy of Sciences(2012B090400016)the Technology Planning Project of Guangdong Province(2012A011100005)
文摘The anonymous communication systems usually have special traffic patterns, which can be detected by censors for further disturbing or blocking. To solve this problem, we present a novel system, Deepflow, to hide anonymous communication traf- fic into the P2P streaming networks such as PPStream by using steganography. Each Deepflow node joins the PPStream network and performs like a normal PPStream client watching a live chan- nel, while embedding communication data into video packets transferred in the network. The steganographed video packets are disseminated by innocuous PPStream clients and reach the target Deepflow node. It is not necessary for Deepflow nodes to link together in the network, which prevents malicious users from sensing IP address of other Deepflow nodes. Deepflow is competent for secret chatting, transferring text documents, or publishing secret bootstrapping information for other anonymous communication systems. Comprehensive experiments in real network environments are conducted in this paper to show the security and efficiency of Deepflow.