会议专题

Deepflow:Hiding Anonymous Communication Traffic in P2P Streaming Networks

  Although the anonymous communication systems such as Tor are designed to conceal the relationship between communication participants,their special traffic patterns can be detected by censors for further disturbing or blocking.Recently some disguise solutions are proposed to transform the traffic between adjacent Tor clients like innocuous-looking traffic.However,a malicious Tor user can still know the contact information of its adjacent clients and cooperate with centralized censorship to identify Tor links.To solve this problem,we present a novel system,Deepflow,to hide anonymous communication traffic into the P2P streaming networks such as PPStream by using steganography.Each Deepflow node joins the PPStream network and performs like a normal PPStream client watching a live channel,while embedding communication data into video packets transferred in the network.The steganographed video packets are disseminated by innocuous PPStream clients and reach the target Deepflow node.There is no need for Deepflow nodes to link together in the network,which prevents malicious users from sensing IP address of other Deepflow nodes.Deepflow is competent for secret chatting,transferring text documents,or publishing secret bootstrapping information for other anonymous communication systems.Comprehensive experiments in real network environments are conducted in this paper to show the security and efficiency of Deepflow.

Anonymity Anticensorship Peer-to-Peer Streaming

国内会议

第八届中国可信计算与信息安全学术会议

湖北恩施

英文

1-9

2014-09-13(万方平台首次上网日期,不代表论文的发表时间)