Skip to main content

A Smart Topology Construction Method for Anti-tracking Network Based on the Neural Network

  • Conference paper
  • First Online:

Abstract

Anti-tracking network is the effective method to protect the network users’ privacy confronted with the increasingly rampant network monitoring and network tracing. But the architecture of the current anti-tracking network is easy to be attacked, traced and undermined. In this paper, We propose smart topology construction method (STon) to provide the self-management and self-optimization of topology for anti-tracking network. We firstly deploy the neural network on each node of the anti-tracking network. Each node can collect its local network state and calculate the network state parameters by the neural network to decide the link state with other nodes. At last, each node optimizes its local topology according to the link state. With the collaboration of all nodes in the network, the network can achieve the self-management and self-optimization of its own topology. The experimental results showes that STon has a better robustness, communication efficiency and anti-tracking performance than the current popular P2P structures.

Supported by the national natural science foundation of China under grant No. U1736218.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Shirazi, F., Simeonovski, M., Asghar, M.R., et al.: A survey on routing in anonymous communication protocols. ACM Comput. Surv. (CSUR) 51(3), 51 (2018)

    Article  Google Scholar 

  2. Ren, J., Wu, J.: Survey on anonymous communications in computer networks. Comput. Commun. 33(4), 420–431 (2010)

    Article  Google Scholar 

  3. Dixon, L., Ristenpart, T., Shrimpton, T.: Network traffic obfuscation and automated internet censorship. IEEE Secur. Priv. 14(6), 43–53 (2016)

    Article  Google Scholar 

  4. Kang, S.: Research on anonymous network topology analysis. In: 2015 International Conference on Automation, Mechanical Control and Computational Engineering. Atlantis Press (2015)

    Google Scholar 

  5. Feinerman, O., Haeupler, B., Korman, A.: Breathe before speaking: efficient information dissemination despite noisy, limited and anonymous communication. Distrib. Comput. 30(5), 339–355 (2017)

    Article  MathSciNet  Google Scholar 

  6. Zang, W., Zhang, P., Wang, X., et al.: Detecting sybil nodes in anonymous communication systems. Procedia Comput. Sci. 17, 861–869 (2013)

    Article  Google Scholar 

  7. Mittal, P., Borisov, N.: Information leaks in structured peer-to-peer anonymous communication systems. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(1), 5 (2012)

    Article  Google Scholar 

  8. Caballero, J., Poosankam, P., Kreibich, C., et al.: Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 621–634. ACM (2009)

    Google Scholar 

  9. Cho, C.Y., Caballero, J., Grier, C., et al.: Insights from the inside: a view of botnet management from infiltration. In: Usenix Conference on Large-scale Exploits & Emergent Threats: Botnets (2010)

    Google Scholar 

  10. Danezis, G.: Designing and attacking anonymous communication systems. University of Cambridge, Computer Laboratory (2004)

    Google Scholar 

  11. Kotzias, P., Matic, S., Caballero, J.: CARONTE: detecting location leaks for deanonymizing tor hidden services. In: ACM SIGSAC Conference on Computer & Communications Security. ACM (2015)

    Google Scholar 

  12. Yin, T., Zhang, Y., Li, J.: AppBot: a novel P2P botnet architecture resistant to graph-based tracking. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 615-622. IEEE (2016)

    Google Scholar 

  13. Yamashita, T., Tanaka, M., Yoshida, E., et al.: To be Bernoulli or to be Gaussian, for a restricted Boltzmann machine. In: International Conference on Pattern Recognition, pp. 1520–1525. IEEE Computer Society (2014)

    Google Scholar 

  14. Hinton, G.E.: Training Products of Experts by Minimizing Contrastive Divergence. MIT Press, Cambridge (2002)

    Book  Google Scholar 

  15. Kerkers, M., Santanna, J.J., Sperotto, A.: Characterisation of the Kelihos.B Botnet. In: Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Stiller, B. (eds.) AIMS 2014. LNCS, vol. 8508, pp. 79–91. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43862-6_11

    Chapter  Google Scholar 

  16. Golovanov, S., Soumenkov, I.: TDL4 top bot. Kaspersky Lab Analysis (2011)

    Google Scholar 

  17. Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: Proceedings of the First International Conference on Peer-to-Peer Computing, pp. 99–100. IEEE (2001)

    Google Scholar 

  18. Leskovec, J.: Stanford Large Network Dataset Collection (2014) [OL]. http://snap.stanford.edu/data/index.html

  19. Maymounkov, P., Mazières, D.: Kademlia: a peer-to-peer information system based on the XOR metric. Revised Papers from the First International Workshop on Peer-to-Peer Systems (2002)

    Chapter  Google Scholar 

  20. Godfrey, B.: Repository of Availability Traces (2015) [OL]. http://pbg.cs.illinois.edu/availability/

  21. Scott, D.M., Novak, D.C., Aultman-Hall, L., et al.: Network robustness index: a new method for identifying critical links and evaluating the performance of transportation networks. J. Transp. Geogr. 14(3), 215–227 (2006)

    Article  Google Scholar 

  22. Zeng, Z., Veeravalli, B.: Design and performance evaluation of queue-and-rate-adjustment dynamic load balancing policies for distributed networks. IEEE Trans. Comput. 55(11), 1410–1422 (2006)

    Article  Google Scholar 

Download references

Acknowledgements

We thank the anonymous reviewers for their insightful comments. This research was supported in part by the national natural science foundation of China under grant No. U1736218.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to YongZheng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tian, C., Zhang, Y., Yin, T., Tuo, Y., Ge, R. (2019). A Smart Topology Construction Method for Anti-tracking Network Based on the Neural Network. In: Wang, X., Gao, H., Iqbal, M., Min, G. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 292. Springer, Cham. https://doi.org/10.1007/978-3-030-30146-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30146-0_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30145-3

  • Online ISBN: 978-3-030-30146-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics