4.5 Article

Novel Packet Size-Based Covert Channel Attacks against Anonymizer

Journal

IEEE TRANSACTIONS ON COMPUTERS
Volume 62, Issue 12, Pages 2411-2426

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TC.2012.169

Keywords

Anonymizer; watermark; TCP dynamics

Funding

  1. National Key Basic Research Program of China (973 Program) [2010CB328104, 2011CB302800]
  2. China National High Technology Research and Development Program [2013AA013503]
  3. National Science Foundation of China (NSFC) [61272054, 61202449, 61003257, 61320106007, 61070221, 61070222]
  4. US National Science Foundation (NSF) [CNS-1116644, DUE-0942113, CNS-0958477, CNS-1117175, CNS-0916584, CNS-1065136, CNS-1218876]
  5. General Research Fund of the Hong Kong SAR, China [CityU 114012, CityU 114513]
  6. ShenZhen (China) Basic Research Project [JCYJ20120618115257259]
  7. China Specialized Research Fund for the Doctoral Program of Higher Education [20110092130002]
  8. JScience Research Foundation of Graduate School of Southeast University
  9. Jiangsu Provincial Key Laboratory of Network and Information Security [BM2003201]
  10. Key Laboratory of Computer Network and Information Integration of Ministry of Education of China [93K-9]
  11. Division Of Computer and Network Systems
  12. Direct For Computer & Info Scie & Enginr [0958477] Funding Source: National Science Foundation

Ask authors/readers for more resources

In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial anonymous communication system. We discovered the architecture of Anonymizer and found that the size of web packets in the Anonymizer network can be very dynamic at the client. Motivated by this finding, we investigated a class of novel packet size-based covert channel attacks against Anonymizer. The attacker between a website and the Anonymizer server can manipulate the web packet size and embed secret signal symbols into the target traffic. An accomplice at the user side can sniff the traffic and recognize the secret signal. In this way, the anonymity provided by Anonymizer is compromised. We developed intelligent and robust algorithms to cope with the packet size distortion incurred by Anonymizer and Internet. We developed techniques to make the attack harder to detect: 1) We pick up right packets of web objects to manipulate to preserve the regularity of the TCP packet size dynamics, which can be measured by the Hurst parameter; 2) We adopt the Monte Carlo sampling technique to preserve the distribution of the web packet size despite manipulation. We have implemented the attack over Anonymizer and conducted extensive analytical and experimental evaluations. It is observed that the attack is highly efficient and requires only tens of packets to compromise the anonymous web surfing via Anonymizer. The experimental results are consistent with our theoretical analysis.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Toward Generative Adversarial Networks for the Industrial Internet of Things

Cheng Qian, Wei Yu, Chao Lu, David Griffith, Nada Golmie

Summary: This article investigates the impact of insufficient data on machine learning model training and proposes a framework using GAN and continuous learning to address the issue. The experimental results demonstrate that new data greatly improves model accuracy, and the proposed defensive mechanism safeguards the model learning process.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

WSCC: A Weight-Similarity-Based Client Clustering Approach for Non-IID Federated Learning

Pu Tian, Weixian Liao, Wei Yu, Erik Blasch

Summary: In this article, a weight-similarity-based client clustering approach is proposed to address the issue of non-IID data in IoT systems. The approach uses an affinity-propagation-based method with the cosine distance of the client's weight parameters to dynamically cluster clients, resulting in improved accuracy compared to existing federated learning schemes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Medical Laboratory Technology

Unexpected serum phosphorus lost in an amniotic fluid embolism patient

Zhen Ling, Shichang Zhang, Huanyu Ju, Jiexin Zhang

Summary: This case report presents a 34-year-old female patient with constant low serum phosphorus concentrations during treatment for amniotic fluid embolism. The patient received extracorporeal membrane oxygenation, continuous renal replacement therapy, and blood component transfusion. The study highlights the release of inorganic phosphorus from platelets and plasma, which stimulates parathyroid hormone secretion and suggests the consideration of vitamin D supplementation and PTH antagonism in ICU patients to benefit recovery.

CLINICA CHIMICA ACTA (2023)

Article Nutrition & Dietetics

Association of Healthy Lifestyles with Non-Alcoholic Fatty Liver Disease: A Prospective Cohort Study in Chinese Government Employees

Zhen Ling, Chengcheng Zhang, Jun He, Feiyun Ouyang, Dan Qiu, Ling Li, Yilu Li, Xuping Li, Yanying Duan, Dan Luo, Shuiyuan Xiao, Minxue Shen

Summary: This study suggests that a combined healthy lifestyle pattern may considerably decrease the risk of NAFLD in Chinese government employees.

NUTRIENTS (2023)

Article Environmental Sciences

Fish Biomonitoring and Ecological Assessment in the Dianchi Lake Basin Based on Environmental DNA

Han Meng, Yuanyuan Lin, Wenjun Zhong, Zheng Zhao, Liang Shen, Zhen Ling, Kaisong Zhao, Shan Xu

Summary: This study used eDNA metabarcoding to monitor fish diversity in the Dianchi Lake basin and constructed the Fish Index of Biological Integrity (F-IBI) for ecological assessment. The results showed distinct diversity patterns among Dianchi Lake and the three inflowing rivers, and water temperature, chemical oxygen demand, total nitrogen, and total phosphorus significantly influenced the distribution of fish communities. According to the F-IBI assessment system, 25% of the sampling sites were defined as 'fine' or above, and 75% were 'impaired' or below.

WATER (2023)

Correction Plant Sciences

Impact of climate change and rubber (Hevea brasiliensis) plantation expansion on reference evapotranspiration in Xishuangbanna, Southwest China (VOL 13, ARTN 830519, 2023)

Zhen Ling, Zhengtao Shi, Shixiang Gu, Tao Wang, Weiwei Zhu, Guojian Feng

FRONTIERS IN PLANT SCIENCE (2023)

Article Computer Science, Information Systems

Wi-Fi device identification based on multi-domain physical layer fingerprint

Jinghui Zhang, Zhengjia Xu, Junhe Li, Qiangsheng Dai, Zhen Ling, Ming Yang

Summary: Physical layer fingerprinting is a promising solution for improving Wi-Fi device security and enhancing Wi-Fi-based applications in IoT scenarios. Existing methods using signal analyzers for feature extraction are not practical and need improvement for devices with complex physical layer modulation. We propose a device fingerprinting technique that extracts various multi-domain features from the physical layer preamble, different from previous works. The proposed scheme achieves high accuracy in identifying fingerprints for different types of IoT Wi-Fi devices and network cards.

COMPUTER COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks

Xiaoheng Deng, Jincai Zhu, Xinjun Pei, Lan Zhang, Zhen Ling, Kaiping Xue

Summary: This paper proposes a Flow Topology based Graph Convolutional Network (FT-GCN) approach for label-limited IoT network intrusion detection. By leveraging flow traffic patterns and flow topological structure, FT-GCN is deployed at edge servers in IoT networks to detect intrusions. It constructs an interval-constrained traffic graph (ICTG) considering the time correlation of traffic flows, and enhances key statistical features of traffic flows using a Node-Level Spatial (NLS) attention mechanism. Intrusion identification in IoT networks is achieved by learning the combined representation of statistical flow features and flow topological structure with the cost-effective Topology Adaptive Graph Convolutional Networks (TAGCN).

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Agronomy

Short-Term Evapotranspiration Forecasting of Rubber (Hevea brasiliensis) Plantations in Xishuangbanna, Southwest China

Zhen Ling, Zhengtao Shi, Tiyuan Xia, Shixiang Gu, Jiaping Liang, Chong-Yu Xu

Summary: A short-term crop evapotranspiration (ETc) forecasting method was proposed for rubber plantations using the rubber crop coefficient K-c and public weather forecasts. The results showed that the method had good performance and acceptable accuracy, especially in the dry season, providing an important basis for improving water management in high water consumption rubber plantations at a regional scale.

AGRONOMY-BASEL (2023)

Article Computer Science, Information Systems

Mobile applications identification using autoencoder based electromagnetic side channel analysis

Jinghui Zhang, Boxi Liang, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang

Summary: In almost every situation of our life, various applications are deployed on mobile smart devices. However, in some situations, sensitive applications are strictly prohibited. Real-time recognition of applications running on mobile smart devices is important in these cases. Most existing technologies require system permissions to obtain the running application list, which is banned by mainstream mobile operating systems. To overcome this limitation, a magnetic field side channel analysis method is introduced to recognize running applications. This method uses autoencoder to extract robust depth features and implements online application recognition through the introduction of a finite-state machine. The proposed method is evaluated by recognizing 1000 different applications in a real environment, showing its feasibility and effectiveness in real-time application identification.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Transformations as Denoising: A Robust Approach to Weaken Adversarial Facial Images

Pu Tian, Turhan Kimbrough, Weixian Liao, Erik Blasch, Wei Yu

Summary: The paper investigates the impact of transformations on adversarial facial images and proposes a simple yet effective framework called TaD for removing possible adversarial perturbations from user images generated by popular FR privacy protection frameworks. Experimental results show that simple transformations can impact protection performance, and choosing DNN-based facial feature extractors can enhance the robustness of facial images with adversarial perturbations.

2022 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Real-Time Execution of Trigger-Action Connection for Home Internet-of-Things

Kai Dong, Yakun Zhang, Yuchen Zhao, Daoming Li, Zhen Ling, Wenjia Wu, Xiaorui Zhu

Summary: This paper proposes a novel trigger notification mechanism called RTX-IFTTT to achieve real-time execution of Applets. The mechanism does not require any changes to the current IFTTT framework or H-IoT devices, but only needs an edge node to identify device events and notify IFTTT to perform the corresponding actions. Experimental results show that the averaged Applet execution delay for RTXIFTTT is only about 2 seconds.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

TeRFF: Temperature-aware Radio Frequency Fingerprinting for Smartphones

Xiaolin Gu, Wenjia Wu, Naixuan Guo, Wei He, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo

Summary: In this study, the instability of the carrier frequency offset (CFO) fingerprint in commonly used smartphones due to temperature fluctuations is addressed. A more reliable and applicable temperature-aware radio frequency fingerprinting (TeRFF) approach is proposed, which involves constructing a dataset by extracting the temperature and corresponding CFO value from multiple smartphones. Multiple Naive Bayes models are trained based on registered temperature values, and a CFO estimation method is designed for unregistered temperatures. Experimental results demonstrate that TeRFF is an effective solution for smartphone identification, outperforming other existing RF fingerprinting schemes.

2022 19TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Implication of Animation on Android Security

Shan Wang, Zhen Ling, Yue Zhang, Ruizhao Liu, Joshua Kraunelis, Kang Jia, Bryan Pearson, Xinwen Fu

Summary: We have discovered that seemingly harmless animations widely used in Android can pose significant threats to the security and privacy of users. Both entrance and exit animations can be exploited to launch various attacks, such as the draw-and-destroy overlay attack and the draw-and-destroy toast attack. These attacks can be used to intercept user inputs stealthily and exploit the slow-in and fade-out animations to suppress alerts and hide malicious activities.

2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022) (2022)

Proceedings Paper Computer Science, Information Systems

fASLR: Function-Based ASLR for Resource-Constrained IoT Systems

Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu

Summary: This paper proposes a function-based ASLR scheme for resource-constrained IoT devices, utilizing ARM TrustZone-M technique and memory protection unit. By randomizing the entry addresses of functions, the scheme enhances runtime security. Compared to related work, the fASLR achieves high randomization entropy with less than 10% runtime overhead.

COMPUTER SECURITY - ESORICS 2022, PT II (2022)

No Data Available