Method and device for identifying anonymous communication traffic of bitcoin hidden service

An anonymous communication and identification method technology, applied in the computer field, can solve the problems of large feature vector dimension and not light enough, and achieve the effects of efficient identification, dimension reduction and calculation load reduction

Pending Publication Date: 2022-04-15
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in practical applications, the present invention finds that the existing encrypted traffic fingerprint recognition technology focuses on feature extraction and classification for application programs such as website browsing or website-type hidden services, and when the hidden service for Bitcoin hidden node type is carried out For classification and recognition, the feature engineering of these methods may not be applicable; in the feature engineering of the existing encrypted traffic fingerprint recognition methods, the dimensionality of the feature vectors is generally large, which is not lightweight enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying anonymous communication traffic of bitcoin hidden service
  • Method and device for identifying anonymous communication traffic of bitcoin hidden service
  • Method and device for identifying anonymous communication traffic of bitcoin hidden service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0047]It should be noted that, unless otherwise defined, the technical terms or scientific terms used in the embodiments of the present invention shall have the usual meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in the present disclosure do not indicate any order, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "connected" are not limited to physical or mechani...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for identifying anonymous communication traffic of bitcoin hidden service, and the method comprises the steps: constructing a feature vector of a traffic sequence to be identified according to the size and direction of a data packet in the traffic sequence; and inputting the feature vector into a classifier obtained by pre-training, and identifying whether the traffic sequence is the anonymous communication traffic of the bitcoin hiding service or not according to the output of the classifier. By applying the method, efficient identification of the bitcoin anonymous service traffic can be realized by constructing the lightweight feature vector.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for identifying anonymous communication traffic of Bitcoin hidden services. Background technique [0002] Website fingerprinting of anonymous networks is a traffic analysis technology. Local attackers passively monitor anonymous network communication traffic, and comprehensively use statistical learning, machine learning, deep learning and other methods to determine whether the monitored traffic belongs to the traffic of the client accessing a specific public Internet website. Or the traffic that belongs to a specific hidden service website that provides external services. The key to website fingerprinting lies in the selection of features. Existing methods use the statistical information of traffic sequences such as packet size, direction, quantity, timing, etc. to construct feature vectors, and the recognition accuracy can reach more than 85%. [0003] Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L67/1061H04L47/2483H04L9/40
Inventor 时金桥王学宾邹可欣王美琪杨金翠石瑞生张熙王东滨李泽禹迟宇航高悦
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products