Deepflow:Hiding Anonymous Communication Traffic in P2P Streaming Networks
Although the anonymous communication systems such as Tor are designed to conceal the relationship between communication participants,their special traffic patterns can be detected by censors for further disturbing or blocking.Recently some disguise solutions are proposed to transform the traffic between adjacent Tor clients like innocuous-looking traffic.However,a malicious Tor user can still know the contact information of its adjacent clients and cooperate with centralized censorship to identify Tor links.To solve this problem,we present a novel system,Deepflow,to hide anonymous communication traffic into the P2P streaming networks such as PPStream by using steganography.Each Deepflow node joins the PPStream network and performs like a normal PPStream client watching a live channel,while embedding communication data into video packets transferred in the network.The steganographed video packets are disseminated by innocuous PPStream clients and reach the target Deepflow node.There is no need for Deepflow nodes to link together in the network,which prevents malicious users from sensing IP address of other Deepflow nodes.Deepflow is competent for secret chatting,transferring text documents,or publishing secret bootstrapping information for other anonymous communication systems.Comprehensive experiments in real network environments are conducted in this paper to show the security and efficiency of Deepflow.
Anonymity Anticensorship Peer-to-Peer Streaming
国内会议
湖北恩施
英文
1-9
2014-09-13(万方平台首次上网日期,不代表论文的发表时间)