De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations

M Nasr, A Bahramali, A Houmansadr - 30th USENIX Security …, 2021 - usenix.org
Deep neural networks (DNNs) are commonly used for various traffic analysis problems, such
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …

[PDF][PDF] FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications.

D Barradas, N Santos, L Rodrigues, S Signorello… - NDSS, 2021 - ndss-symposium.org
An emerging trend in network security consists in the adoption of programmable switches for
performing various security tasks in large-scale, high-speed networks. However, since …

Deepcorr: Strong flow correlation attacks on tor using deep learning

M Nasr, A Bahramali, A Houmansadr - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …

A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018 - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

Encrypted DNS--> privacy? A traffic analysis perspective

S Siby, M Juarez, C Diaz, N Vallina-Rodriguez… - arXiv preprint arXiv …, 2019 - arxiv.org
Virtually every connection to an Internet service is preceded by a DNS lookup which is
performed without any traffic-level protection, thus enabling manipulation, redirection …

Optimizing feature selection for efficient encrypted traffic classification: A systematic approach

M Shen, Y Liu, L Zhu, K Xu, X Du, N Guizani - IEEE Network, 2020 - ieeexplore.ieee.org
Traffic classification is a technology for classifying and identifying sensitive information from
cluttered traffic. With the increasing use of encryption and other evasion technologies …

DeepCoFFEA: Improved flow correlation attacks on Tor via metric learning and amplification

SE Oh, T Yang, N Mathews, JK Holland… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
End-to-end flow correlation attacks are among the oldest known attacks on low-latency
anonymity networks, and are treated as a core primitive for traffic analysis of Tor. However …

Frequency domain feature based robust malicious traffic detection

C Fu, Q Li, M Shen, K Xu - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …