Abstract
Anti-tracking network is the effective method to protect the network users’ privacy confronted with the increasingly rampant network monitoring and network tracing. But the architecture of the current anti-tracking network is easy to be attacked, traced and undermined. In this paper, We propose smart topology construction method (STon) to provide the self-management and self-optimization of topology for anti-tracking network. We firstly deploy the neural network on each node of the anti-tracking network. Each node can collect its local network state and calculate the network state parameters by the neural network to decide the link state with other nodes. At last, each node optimizes its local topology according to the link state. With the collaboration of all nodes in the network, the network can achieve the self-management and self-optimization of its own topology. The experimental results showes that STon has a better robustness, communication efficiency and anti-tracking performance than the current popular P2P structures.
Supported by the national natural science foundation of China under grant No. U1736218.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shirazi, F., Simeonovski, M., Asghar, M.R., et al.: A survey on routing in anonymous communication protocols. ACM Comput. Surv. (CSUR) 51(3), 51 (2018)
Ren, J., Wu, J.: Survey on anonymous communications in computer networks. Comput. Commun. 33(4), 420–431 (2010)
Dixon, L., Ristenpart, T., Shrimpton, T.: Network traffic obfuscation and automated internet censorship. IEEE Secur. Priv. 14(6), 43–53 (2016)
Kang, S.: Research on anonymous network topology analysis. In: 2015 International Conference on Automation, Mechanical Control and Computational Engineering. Atlantis Press (2015)
Feinerman, O., Haeupler, B., Korman, A.: Breathe before speaking: efficient information dissemination despite noisy, limited and anonymous communication. Distrib. Comput. 30(5), 339–355 (2017)
Zang, W., Zhang, P., Wang, X., et al.: Detecting sybil nodes in anonymous communication systems. Procedia Comput. Sci. 17, 861–869 (2013)
Mittal, P., Borisov, N.: Information leaks in structured peer-to-peer anonymous communication systems. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(1), 5 (2012)
Caballero, J., Poosankam, P., Kreibich, C., et al.: Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 621–634. ACM (2009)
Cho, C.Y., Caballero, J., Grier, C., et al.: Insights from the inside: a view of botnet management from infiltration. In: Usenix Conference on Large-scale Exploits & Emergent Threats: Botnets (2010)
Danezis, G.: Designing and attacking anonymous communication systems. University of Cambridge, Computer Laboratory (2004)
Kotzias, P., Matic, S., Caballero, J.: CARONTE: detecting location leaks for deanonymizing tor hidden services. In: ACM SIGSAC Conference on Computer & Communications Security. ACM (2015)
Yin, T., Zhang, Y., Li, J.: AppBot: a novel P2P botnet architecture resistant to graph-based tracking. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 615-622. IEEE (2016)
Yamashita, T., Tanaka, M., Yoshida, E., et al.: To be Bernoulli or to be Gaussian, for a restricted Boltzmann machine. In: International Conference on Pattern Recognition, pp. 1520–1525. IEEE Computer Society (2014)
Hinton, G.E.: Training Products of Experts by Minimizing Contrastive Divergence. MIT Press, Cambridge (2002)
Kerkers, M., Santanna, J.J., Sperotto, A.: Characterisation of the Kelihos.B Botnet. In: Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Stiller, B. (eds.) AIMS 2014. LNCS, vol. 8508, pp. 79–91. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43862-6_11
Golovanov, S., Soumenkov, I.: TDL4 top bot. Kaspersky Lab Analysis (2011)
Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: Proceedings of the First International Conference on Peer-to-Peer Computing, pp. 99–100. IEEE (2001)
Leskovec, J.: Stanford Large Network Dataset Collection (2014) [OL]. http://snap.stanford.edu/data/index.html
Maymounkov, P., Mazières, D.: Kademlia: a peer-to-peer information system based on the XOR metric. Revised Papers from the First International Workshop on Peer-to-Peer Systems (2002)
Godfrey, B.: Repository of Availability Traces (2015) [OL]. http://pbg.cs.illinois.edu/availability/
Scott, D.M., Novak, D.C., Aultman-Hall, L., et al.: Network robustness index: a new method for identifying critical links and evaluating the performance of transportation networks. J. Transp. Geogr. 14(3), 215–227 (2006)
Zeng, Z., Veeravalli, B.: Design and performance evaluation of queue-and-rate-adjustment dynamic load balancing policies for distributed networks. IEEE Trans. Comput. 55(11), 1410–1422 (2006)
Acknowledgements
We thank the anonymous reviewers for their insightful comments. This research was supported in part by the national natural science foundation of China under grant No. U1736218.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Tian, C., Zhang, Y., Yin, T., Tuo, Y., Ge, R. (2019). A Smart Topology Construction Method for Anti-tracking Network Based on the Neural Network. In: Wang, X., Gao, H., Iqbal, M., Min, G. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 292. Springer, Cham. https://doi.org/10.1007/978-3-030-30146-0_31
Download citation
DOI: https://doi.org/10.1007/978-3-030-30146-0_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30145-3
Online ISBN: 978-3-030-30146-0
eBook Packages: Computer ScienceComputer Science (R0)