Computer Science ›› 2025, Vol. 52 ›› Issue (7): 363-371.doi: 10.11896/jsjkx.240900102

• Information Security • Previous Articles     Next Articles

Tor Multipath Selection Based on Threaten Awareness

CHEN Shangyu1, HU Hongchao1, ZHANG Shuai1,2, ZHOU Dacheng1,2, YANG Xiaohan1,2   

  1. 1 Institute of Information Technology, University of Information Engineering, Zhengzhou 450002, China
    2 Key Laboratory of Cyberspace Security, Ministry of Education of China, Zhengzhou 450002, China
  • Received:2024-09-18 Revised:2025-01-17 Published:2025-07-17
  • About author:CHEN Shangyu,born in 2000, postgra- duate.His main research interests include cyber security and anonymous communication.
    HU Hongchao,born in 1982,professor,Ph.D supervisor.His main research interests include cloud computing security and cyber security.
  • Supported by:
    National Natural Science Foundation of China(62072467) and Major Science and Technology Special Projects of Henan Province(221100211200-02).

Abstract: With the development and application of machine learning and deep learning,attackers can conduct traffic analysis on malicious nodes and malicious AS on Tor user links,thus carrying out de-anonymization attacks on Tor users.At present,one of the common defense methods for traffic analysis attacks is to insert virtual packets or delay real packets to change traffic characteristics,which will introduce bandwidth and delay costs.The other type defends by dividing user traffic and transmitting it through multiple paths.This method lacks the perception of malicious nodes and malicious AS on the circuit.When an attacker collects a complete traffic trail,it is still difficult to resist the de-anonymization attack on Tor users by traffic analysis.In order to make up for the lack of threat awareness in the path selection of multi-path defense methods,this paper proposes a multipath selection algorithm based on threat awareness,which integrates malicious node awareness and malicious AS awareness.Firstly,an improved method of node distance measurement is proposed,and the improved distance measurement is used to cluster nodes based on K-Mediods algorithm,which improves the detection effect of malicious nodes.Then the improved AS sensing algorithm is improved the anonymity requirement.Finally,a multi-path selection algorithm based on threat perception is proposed by combining malicious node detection and AS sensing algorithm.The experimental results show that the proposed algorithm can not only resist a variety of traffic analysis attacks,but also ensure certain performance requirements of Tor circuits.

Key words: Anonymous communication, Traffic analysis, Multipath, Malicious node detection, AS awareness

CLC Number: 

  • TP393.08
[1]KARUNANAYAKEI,AHMED N,MALANEY R,et al.De-anonymisation attacks on tor:A survey[J].IEEE Communications Surveys & Tutorials,2021,23(4):2324-2350.
[2]NASRM,BAHRAMALI A,HOUMANSADR A.Deepcorr:Strong flow correlation attacks on tor using deep learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:1962-1976.
[3]OH S E,YANG T,MATHEWS N,et al.DeepCoFFEA:Im-proved flow correlation attacks on Tor via metric learning and amplification[C]//2022 IEEE Symposium on Security and Privacy(SP).IEEE,2022:1915-1932.
[4]AMINUDDINM A I M,ZAABA Z F,SAMSUDIN A,et al.The rise of website fingerprinting on Tor:Analysis on techniques and assumptions[J].Journal of Network and Computer Applications,2023,212:103582.
[5]RAHMANS M,SIRINAM P,MATHEWS N,et al.Tik-Tok:The Utility of Packet Timing in Website Fingerprinting Attacks[C]//Proceedings on Privacy Enhancing Technologies.2020:5-24.
[6]SIRINAMP,IMANI M,JUAREZ M,et al.Deep fingerprinting:Undermining website fingerprinting defenses with deep learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:1928-1943.
[7]SHENM,JI K,GAO Z,et al.Subverting website fingerprinting defenses with robust traffic representation[C]//32nd USENIX Security Symposium(USENIX Security 23).2023:607-624.
[8]XIAOX,ZHOU X,YANG Z,et al.A comprehensive analysis of website fingerprinting defenses on Tor[J].Computers & Security,2024,136:103577.
[9]ABUSNAINAA,JANG R,KHORMALI A,et al.Dfd:Adver-sarial learning-based approach to defend against website fingerprinting[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.IEEE,2020:2459-2468.
[10]HONGX,MA X,LI S,et al.A website fingerprint defense technology with low delay and controllable bandwidth[J].Computer Communications,2022,193:332-345.
[11]HENRIS,GARCIA-AVILES G,SERRANO P,et al.Protecting against Website Fingerprinting with Multihoming[C]//Proceedings on Privacy Enhancing Technologies.2020:89-110.
[12]DE LA CADENA W,MITSEVA A,HILLER J,et al.Trafficsliver:Fighting website fingerprinting attacks with traffic splitting[C]//Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.2020:1971-1985.
[13]BARTON A,WRIGHT M.DeNASA:Destination-Naive AS-Awareness in Anonymous Communications[C]//Proceedings on Privacy Enhancing Technologies,2016:356-372.
[14]LYU M,ZHU Y F,LIN W.Dynamic Routing Algorithm Basedon Bandwidth of Anonymous Network[J].Journal of Information Engineering University,2019,20(5):591-596.
[15]FENG Q,XIA Y,YAO W,et al.Malicious Relay Detection forTor Network Using Hybrid Multi-Scale CNN-LSTM with Attention[C]//2023 IEEE Symposium on Computers and Communications(ISCC).IEEE,2023:1242-1247.
[16]ROCHET f,WAILSR,JOHNSON A,et al.CLAPS:Client-location-aware path selection in Tor[C]//Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.2020:17-34.
[1] ZHANG Yuekang, SHE Yanhong. Hierarchical Classification with Multi-path Selection Based on Calculation of Correlation Degree of Granularity Categories in the Same Level [J]. Computer Science, 2025, 52(7): 119-126.
[2] SUI Jiaqi, HU Hongchao, SHI Xin, ZHOU Dacheng, CHEN Shangyu. Tor Network Path Selection Algorithm Based on Similarity Perception [J]. Computer Science, 2025, 52(3): 391-399.
[3] CHEN Hongwei, YIN Xiaokang, GAI Xianzhe, JIA Fan, LIU Shengli, CAI Ruijie. New Type of UDP Reflection Amplification Protocol Recognition Method Based on Active-Passive Combination [J]. Computer Science, 2024, 51(8): 412-419.
[4] ZHANG Zhongxin, YI Ming, XIAO Shuaifang. Key Generation Scheme Based on RIS Multipath Random Superposition [J]. Computer Science, 2024, 51(5): 414-420.
[5] PANG Xing-long, ZHU Guo-sheng. Survey of Network Traffic Analysis Based on Semi Supervised Learning [J]. Computer Science, 2022, 49(6A): 544-554.
[6] DONG Chao-ying, XU Xin, LIU Ai-jun, CHANG Jing-hui. New Routing Methods of LEO Satellite Networks [J]. Computer Science, 2020, 47(12): 285-290.
[7] GUO Qi, CUI Jing-song. Covert Communication Method Based on Closed Source Streaming Media [J]. Computer Science, 2019, 46(9): 150-155.
[8] ZHANG Jin-hui, DENG Qian, LI Zhen-yu. Study on Application of Network Coding and Multipath Transmission in Internet Live Video Broadcasting [J]. Computer Science, 2019, 46(8): 171-177.
[9] QIN Kuang-yu, HUANG Chuan-he, LIU Ke-wei, SHI Jiao-li and CHEN Xi. Multipath Routing Algorithm in Software Defined Networking Based on Multipath Broadcast Tree [J]. Computer Science, 2018, 45(1): 211-215.
[10] YAN Jun-ya, QIAN Yu-hua, LI Hua-feng and MA Shang-cai. Node Localization Based on Multipath Distance and Neural Network in WSN [J]. Computer Science, 2017, 44(8): 71-75.
[11] NONG Huang-wu, HUANG Chuan-he and HUANG Xiao-peng. SDN-based Multipath Routing Algorithm for Fat-tree Data Center Networks [J]. Computer Science, 2016, 43(6): 32-34.
[12] WANG Jun, DU Wei-qi, LIU Hui and WANG Lei. Multipath Routing Protocol Based on Braid-multipath Network Coding Model for Wireless Sensor Networks [J]. Computer Science, 2016, 43(11): 135-141.
[13] WANG Shao-hui, JIANG Ji-hong and XIAO Fu. New Design of Rerouting-based Anonymous Communication System [J]. Computer Science, 2016, 43(10): 154-159.
[14] ZHU Wei-na, ZHOU Jie, CAI Shi-qing and SHEN Xiao-yan. Research on Channel Esitimation of Scattering Channel Models in Mobile Communication Macrocell Environments [J]. Computer Science, 2016, 43(10): 87-92.
[15] DU Wen-feng and WU Zhen. Data Distribution Algorithm with Out-of-order Feedback for CMT over Diversity Network [J]. Computer Science, 2015, 42(3): 60-64.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!