DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a groundbreaking deep learning-based flow correlation attack on Tor called DeepCorr in this 27-minute conference talk. Delve into the architecture, data collection methods, and comparison with previous works. Examine the impact of time, flow length, and training set size on the attack's effectiveness. Analyze potential countermeasures and experiments on pluggable transports. Gain insights into the implications for Tor's security and the importance of flow correlation in various attacks on the network.
Syllabus
Intro
Flow Correlation Attack
Forcing Traffic Through Malicious Relays
Bottomline: Flow correlation is key to many Tor attacks
Intuition: Tor is super noisy!
Architecture
Data Collection
Comparison with Previous Works
Impact of time
Effect of Flow Length
Countermeasures
Experiments on Pluggable Transports
Conclusions
Size of Training Set
Negligible Circuit Dependency
Taught by
Association for Computing Machinery (ACM)
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube Identifying the Scan and Attack Infrastructure Behind Amplification DDoS Attacks
Association for Computing Machinery (ACM) via YouTube