A Survey on Tor Encrypted Traffic Monitoring
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 8
Abstract
Tor (The Onion Router) is an anonymity tool that is widely used worldwide. Tor protect its user privacy against surveillance and censorship using strong encryption and obfuscation techniques which makes it extremely difficult to monitor and identify users’ activity on the Tor network. It also implements strong defense to protect the users against traffic features extraction and website fingerprinting. However, the strong anonymity also became the heaven for criminal to avoid network tracing. Therefore, numerous of research has been performed on encrypted traffic analyzing and classification using machine learning techniques. This paper presents survey on existing approaches for classification of Tor and other encrypted traffic. There is preliminary discussion on machine learning approaches and Tor network. Next, there are comparison of the surveyed traffic classification and discussion on their classification properties.
Authors and Affiliations
Mohamad Amar Irsyad Mohd Aminuddin, Zarul Fitri Zaaba, Manmeet Kaur Mahinderjit Singh, Darshan Singh Mahinder Singh
A New Strategy to Optimize the Load Migration Process in Cloud Environment
Cloud computing is a model of internet-based service that provides easy access to a set of changeable computational sources through internet for users based on their demand. Load balancing in cloud have to manage service...
Integration of Wearable Smart Sensor for Improving e-Healthcare
Analyzing health conditions using sensors is one of the daily activities in a healthcare organization. The purpose of this research is to improve the e-healthcare formulated through the integration of wearable smart sens...
Proposed Multi-Modal Palm Veins-Face Biometric Authentication
Biometric authentication technology identifies people by their unique biological information. An account holder’s body characteristics or behaviors are registered in a database and then compared with others who may try t...
Contemplation of Effective Security Measures in Access Management from Adoptability Perspective
With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable a...
Web and Telco Service Integration: A Dynamic and Adaptable Approach
The current evolution of the Web, known as Web 2.0 and characterized by providing a diverse global service ecosystem, has marked a change in the role played by telecom operators. In order to maintain high competitive mar...