Skip to main navigation Skip to search Skip to main content

Adaptive traffic fingerprinting for darknet threat intelligence

  • Hamish Haughey
  • , Gregory Epiphaniou
  • , Haider Al-Khateeb
  • , Ali Dehghantanha
  • Northumbria University
  • University of Sheffield

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

7 Citations (Scopus)
6 Downloads (Pure)

Abstract

Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it gives enough power to nefarious actors to masquerade their illegal activities, it is also the corner stone to facilitate freedom of speech and privacy. We present a proof of concept for a novel algorithm that could form the fundamental pillar of a darknet-capable Cyber Threat Intelligence platform. The solution can reduce anonymity of users of Tor, and considers the existing visibility of network traffic before optionally initiating targeted or widespread BGP interception. In combination with server HTTP response manipulation, the algorithm attempts to reduce the candidate data set to eliminate client-side traffic that is most unlikely to be responsible for server-side connections of interest. Our test results show that MITM manipulated server responses lead to expected changes received by the Tor client. Using simulation data generated by shadow, we show that the detection scheme is effective with false positive rate of 0.001, while sensitivity detecting non-targets was 0.016±0.127. Our algorithm could assist collaborating organisations willing to share their threat intelligence or cooperate during investigations.
Original languageEnglish
Title of host publicationCyber Threat Intelligence
PublisherSpringer
Pages193-217
Volume70
ISBN (Print)9783319739519
DOIs
Publication statusPublished - 24 Apr 2018

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 16 - Peace, Justice and Strong Institutions
    SDG 16 Peace, Justice and Strong Institutions

Keywords

  • Darknet
  • MITM
  • Threat intelligence
  • Traffic finger printing

Fingerprint

Dive into the research topics of 'Adaptive traffic fingerprinting for darknet threat intelligence'. Together they form a unique fingerprint.

Cite this