A method for identifying Tor hosts based on machine learning techniques

Tor is an anonymous Internet communication system based on onion routing network protocol. Network traffics generated by normal applications become hard to trace when they are delivered by Tor system. However, an increasing number of cyber criminals are utilizing Tor to remain anonymous while carryi...

Full description

Bibliographic Details
Main Authors: Zhang Ling, Wei Chuanzheng, Lin Zhenbiao, Duan Linlin
Format: Article
Language:zho
Published: National Computer System Engineering Research Institute of China 2021-04-01
Series:Dianzi Jishu Yingyong
Subjects:
tor
Online Access:http://www.chinaaet.com/article/3000130543
id doaj-dbf9155bf2b1460db6885d67d9a1ba4f
record_format Article
spelling doaj-dbf9155bf2b1460db6885d67d9a1ba4f2021-05-21T06:13:10ZzhoNational Computer System Engineering Research Institute of ChinaDianzi Jishu Yingyong0258-79982021-04-01474545810.16157/j.issn.0258-7998.2007593000130543A method for identifying Tor hosts based on machine learning techniquesZhang Ling0Wei Chuanzheng1Lin Zhenbiao2Duan Linlin3Beijing Cyber XingAn Technology Co.,Ltd.,Beijing 102200,ChinaBeijing Cyber XingAn Technology Co.,Ltd.,Beijing 102200,ChinaBeijing Cyber XingAn Technology Co.,Ltd.,Beijing 102200,ChinaSchool of Information Engineering,Zhengzhou University,Zhengzhou 450001,ChinaTor is an anonymous Internet communication system based on onion routing network protocol. Network traffics generated by normal applications become hard to trace when they are delivered by Tor system. However, an increasing number of cyber criminals are utilizing Tor to remain anonymous while carrying out their crimes or make illegal transactions. As a countermeasure, this paper presents a method able to identify Tor traffics and thereby recognize related Tor hosts. The method proposes several groups of features extracted from network traffic and resort to machine learning algorithm to evaluate feature effectiveness. Experiments in real world dataset demonstrate that the proposed method is able to distinguish Tor flows from normal traffics as well as recognize the kind of activity in Tor generated by different normal applications.http://www.chinaaet.com/article/3000130543darknet detectiontorcommunication entity recognitionmachine learning
collection DOAJ
language zho
format Article
sources DOAJ
author Zhang Ling
Wei Chuanzheng
Lin Zhenbiao
Duan Linlin
spellingShingle Zhang Ling
Wei Chuanzheng
Lin Zhenbiao
Duan Linlin
A method for identifying Tor hosts based on machine learning techniques
Dianzi Jishu Yingyong
darknet detection
tor
communication entity recognition
machine learning
author_facet Zhang Ling
Wei Chuanzheng
Lin Zhenbiao
Duan Linlin
author_sort Zhang Ling
title A method for identifying Tor hosts based on machine learning techniques
title_short A method for identifying Tor hosts based on machine learning techniques
title_full A method for identifying Tor hosts based on machine learning techniques
title_fullStr A method for identifying Tor hosts based on machine learning techniques
title_full_unstemmed A method for identifying Tor hosts based on machine learning techniques
title_sort method for identifying tor hosts based on machine learning techniques
publisher National Computer System Engineering Research Institute of China
series Dianzi Jishu Yingyong
issn 0258-7998
publishDate 2021-04-01
description Tor is an anonymous Internet communication system based on onion routing network protocol. Network traffics generated by normal applications become hard to trace when they are delivered by Tor system. However, an increasing number of cyber criminals are utilizing Tor to remain anonymous while carrying out their crimes or make illegal transactions. As a countermeasure, this paper presents a method able to identify Tor traffics and thereby recognize related Tor hosts. The method proposes several groups of features extracted from network traffic and resort to machine learning algorithm to evaluate feature effectiveness. Experiments in real world dataset demonstrate that the proposed method is able to distinguish Tor flows from normal traffics as well as recognize the kind of activity in Tor generated by different normal applications.
topic darknet detection
tor
communication entity recognition
machine learning
url http://www.chinaaet.com/article/3000130543
work_keys_str_mv AT zhangling amethodforidentifyingtorhostsbasedonmachinelearningtechniques
AT weichuanzheng amethodforidentifyingtorhostsbasedonmachinelearningtechniques
AT linzhenbiao amethodforidentifyingtorhostsbasedonmachinelearningtechniques
AT duanlinlin amethodforidentifyingtorhostsbasedonmachinelearningtechniques
AT zhangling methodforidentifyingtorhostsbasedonmachinelearningtechniques
AT weichuanzheng methodforidentifyingtorhostsbasedonmachinelearningtechniques
AT linzhenbiao methodforidentifyingtorhostsbasedonmachinelearningtechniques
AT duanlinlin methodforidentifyingtorhostsbasedonmachinelearningtechniques
_version_ 1721432467359924224