期刊文献+

基于生成对抗网络的网络流量特征伪装技术 被引量:3

Network Traffic Feature Camouflage Technology Based on Generating Adversarial Network
下载PDF
导出
摘要 互联网服务提供商通过使用流量分析攻击技术对流量进行分类和监控,目前的防御措施多数缺乏动态性与应对网络环境变化的灵活性,而且依赖于具体的某种流量的特征,容易被探测和屏蔽。为抵御流量分析攻击,提出一种新的流量隐藏技术,代理服务器将流量动态地伪装成任意目标流量,运用生成对抗网络模型来学习目标网络流量的特征,将源流量变为与目标正常流量不可区分的流量,以保障隐私和规避互联网监控。实验结果表明,该技术在准确率等性能指标上表现良好,且拥有同类方案所不具备的动态性,明显提升了流量的匿名性。 Internet service providers often use traffic analysis attack technology to classify and monitor traffic.However,most of the current defense measures lack the flexibility to respond to changes in the network environment,and their dependence on specific traffic characteristics makes them easy to be detected and shielded.To defend against these attacks,we propose a new traffic hiding technology,which enables the proxy server dynamically camouflages any target traffic.We use the Generating Adversarial Network(GAN)model to learn the characteristics of the target traffic,making the source traffic indistinguishable from the target normal traffic so as to protect privacy and avoid Internet monitoring.Experimental results show that the proposed technology has better accuracy and flexibility,and the anonymity of traffic is obviously improved under the existing traffic analysis attack technology.
作者 李杰 周路 李华欣 闫璐 朱浩瑾 LI Jie;ZHOU Lu;LI Huaxin;YAN Lu;ZHU Haojin(School of Electronic Information and Electrical Engineering,Shanghai Jiao Tong University,Shanghai 200240,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第12期119-126,共8页 Computer Engineering
基金 国家自然科学基金面上项目(61672350) 装备预研教育部联合基金
关键词 生成对抗网络 网络安全 网站指纹 流量分析 流量特征伪装 Generating Adversarial Network(GAN) network security Website fingerprint traffic analysis traffic feature camouflage
  • 相关文献

参考文献4

二级参考文献19

  • 1冯宗彬,时剑,黄国庆,李斌,刘军.一种新的P2P僵尸网络综合防御系统框架[J].军事通信技术,2010(1):66-71. 被引量:1
  • 2王海龙,胡宁,龚正虎.Bot_CODA:僵尸网络协同检测体系结构[J].通信学报,2009,30(S1):15-22. 被引量:9
  • 3E.Casilari, A. Reyes-Lecuona, F.J. Gonz6lez, A. Diaz-Estrella and F. Sandoval. Characterisation of Web Traffic. 2001 IEEE. 被引量:1
  • 4Yogesh Bhole, Adrian Popescu. Measurement and Analysis of HTFP Traffic. Journal of Network and Systems Management, Vol. 13, No. 4, December 2005. 被引量:1
  • 5Tom Callahan, Mark Allman, Vern Paxson. A Longitudinal View of HTYP Traffic.2010. 被引量:1
  • 6Sunghwan lhm, Vivek S. Pal. Towards Understanding Modern Web Traffic. 2011 ACM. 被引量:1
  • 7Fabian Schneider, Bernhard Ager, Gregor Maier. Pitfalls in HTFP Traffic Measurements and Analysis. Springer. pp. 242-251, 2012. 被引量:1
  • 8Song Lin, Zhiguo Gao, Ke Xu. Web 2.0 Traffic Measurement Analysis on Online Map Applications. 2009 ACM. 被引量:1
  • 9Brice Augqlstin and Abdelhamid Mellouk. On Traffic Patterns of HTFP Applications. 2011 IEEE. 被引量:1
  • 10Luca Caviglione. Extending HTYP Models to Web 2.0 Applications: the case of Social Networks. 2011 IEEE. 被引量:1

共引文献39

同被引文献28

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部