GPU-Accelerated Deep Learning-Based Correlation Attack on Tor Networks

Muhammad Asfand Hafeez, Yasir Ali,Kyung Hyun Han,Seong Oun Hwang

IEEE Access(2023)

引用 0|浏览1
暂无评分
摘要
The Tor network, renowned for its provision of online privacy and anonymity, faces the constant threat of correlation attacks that aim to compromise user identities. For almost two decades, these correlation attacks were based on statistical methods. However, in recent years, deep learning-based correlation attacks have been introduced to make them more accurate. Nevertheless, in addition to being accurate, fast correlation attacks on Tor are crucial for assessing the real-world viability of such attacks because reduced correlation time aids in estimating its practical implications. Moreover, a reduction in correlation time also helps improve efficiency and ensures practical relevance of the attack. The existing state-of-the-art implementation of a correlation attack on Tor suffers from slow performance and large memory requirements. For instance, training the model required 133 GB of memory, and correlating 10,000 flows takes about 976 seconds. In this paper, we present a novel GPU-based correlation strategy and a fast traffic flow loading technique to reduce time complexity by $7.12\times $ compared to existing methods. Our computational approach, reliant on PyCUDA, facilitates the parallelization of operations used in the attack, thereby enabling efficient execution through the utilization of GPU architecture. Leveraging these two approaches, we introduced an improved correlation attack, which shows high accuracy and fast performance compared to state-of-the-art methods. Moreover, we address resource limitation issues by reducing memory consumption by 47.37% during the training phase, which allows the model to be trained with much fewer resources.
更多
查看译文
关键词
Anonymity network, correlation attack, parallel computing, traffic analysis, Tor network
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要