Proceedings of the Institute for System Programming of the RAS
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Proceedings of ISP RAS:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Proceedings of the Institute for System Programming of the RAS, 2016, Volume 28, Issue 3, Pages 21–34
DOI: https://doi.org/10.15514/ISPRAS-2016-28(3)-2
(Mi tisp35)
 

Deep web users deanonimization system

S. M. Avdoshin, A. V. Lazarenko

National Research University Higher School of Economics
References:
Abstract: Privacy enhancing technologies (PETs) are ubiquitous nowadays. They are beneficial for a wide range of users: for businesses, journalists, bloggers, etc. However, PETs are not always used for legal activity. There a lot of anonymous networks and technologies which grants anonymous access to digital resources. The most popular anonymous networks nowadays is Tor. Tor is a valuable tool for hackers, drug and gun dealers. The present paper is focused on Tor users' deanonimization using out-of-the box technologies and a basic machine learning algorithm. The aim of the work is to show that it is possible to deanonimize a small fraction of users without having a lot of resources and state-of-the-art machine learning techniques. The first stage of the research was the investigation of contemporary anonymous networks. The second stage was the investigation of deanonimization techniques: traffic analysis, timing attacks, attacks with autonomous systems. For our system, we used website fingerprinting attack, because it requires the smallest number of resources needed for successful implementation of the attack. Finally, there was an experiment held with 5 persons in one room with one corrupted entry Tor relay. We achieved a quite good accuracy (70%) for classifying the webpage, which the user visits, using the set of resources provided by global cybersecurity company. The deanonimization is a very important task from the point of view of national security.
Keywords: Tor, deanonimization, website fingerprinting, traffic analysis, anonymous network, deep web.
Bibliographic databases:
Document Type: Article
Language: English
Citation: S. M. Avdoshin, A. V. Lazarenko, “Deep web users deanonimization system”, Proceedings of ISP RAS, 28:3 (2016), 21–34
Citation in format AMSBIB
\Bibitem{AvdLaz16}
\by S.~M.~Avdoshin, A.~V.~Lazarenko
\paper Deep web users deanonimization system
\jour Proceedings of ISP RAS
\yr 2016
\vol 28
\issue 3
\pages 21--34
\mathnet{http://mi.mathnet.ru/tisp35}
\crossref{https://doi.org/10.15514/ISPRAS-2016-28(3)-2}
\elib{https://elibrary.ru/item.asp?id=26605244}
Linking options:
  • https://www.mathnet.ru/eng/tisp35
  • https://www.mathnet.ru/eng/tisp/v28/i3/p21
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Proceedings of the Institute for System Programming of the RAS
    Statistics & downloads:
    Abstract page:220
    Full-text PDF :102
    References:30
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024