Wentao Huang’s research while affiliated with Beijing University of Posts and Telecommunications and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (4)


Figure 2. Tor network simulation environment based on K8s. * represents the components of K8s, of which etcd is the database that stores the state of the entire cluster; apiserver provides the only entry point for users to operate resources; controller-manager is responsible for maintaining the state of the cluster; scheduler is responsible for scheduling Pods to the appropriate machines according to a predefined scheduling policy; kubelet is responsible for maintaining the container lifecycle, as well as Volume (CVI) and network (CNI) management.
Figure 4. Private Tor network organization process.
Figure 5. Circuit Association and Hidden Service Traceability Scenario Diagram.
Figure 6. Architectural Design of the Tor Network Simulation Method Based on Hybrid Networking of Multi-granularity Relays.
Table of the experimental environment.

+2

K8s-enhanced lightweight simulation method for the Tor network
  • Article
  • Full-text available

March 2025

·

29 Reads

Wentao Huang

·

Han Wu

·

Zeyu Li

·

[...]

·

Jinqiao Shi

Criminals exploit the robust anonymity afforded by Tor for illicit purposes, prompting heightened interest among researchers in de-anonymization attacks on the Tor network. The execution of experiments on de-anonymization attacks within a real Tor network presents considerable challenges, hence the necessity for a simulation environment. However, existing methods for simulating the Tor network are inadequate regarding realism, flexibility, and scalability, with some being prohibitively expensive. In this paper, we develop a lightweight and scalable Tor network simulation environment based on Kubernetes (K8s), employing Docker containers to simulate Tor relays. The results demonstrate that a network of up to a thousand Tor relays can be simulated using just four standard hosts. Furthermore, two de-anonymization attack experiments were conducted within this simulated environment, which exhibited high levels of realism and flexibility. Finally, a hybrid networking approach combining multi-granularity relays was explored to enhance further the balance between realism and cost in Tor network simulations.

Download


Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence

January 2022

·

31 Reads

·

3 Citations

Lecture Notes in Computer Science

Tor enables end user the desirable cyber anonymity with obfuscation technologies like MEEK. However, it has also manifested itself a wide shield for various illegal hidden services involved cyber criminals, motivating the urgent need of deanonymization technologies. In this paper, we propose a novel communication fingerprint abstracted from key packet sequences, and attempt to efficiently identify end users MEEK-based access to Tor hidden services. Specifically, we investigate the communication fingerprint during the early connection stage of MEEK-based Tor rendezvous establishment, and make use of deep neural network to automatically learn and form a key packet sequence. Unlike most of existing approaches that rely on the entire long communication packet sequence, experiments demonstrate that our key packet sequence enabled scheme can significantly reduce both the time and hardware resource consumption for the identification task by 23%–37% and 80%–86%, respectively, while being able to keep a slightly better accuracy.KeywordsTorHidden serviceTraffic analysisMEEK


Citations (2)


... [16] for the popular anonymizing web browser, The Onion Router (Tor), that allows users to obfuscate their web traffic using domain fronted connections to existing MEEK servers provided by UC Berkeley in both the Amazon and Google CDNs. Since the release of this paper, MEEK has become widely used as a Tor into the detection and prevention of domain fronted traffic through the MEEK pluggable [11], [13], [18], [20]. These innovations in detection/prevention are typically neural ne no Deep Packet Inspection [20]. ...

Reference:

Domain Fronting Through Microsoft Azure and CloudFlare: How to Identify Viable Domain Fronting Proxies
Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence
  • Citing Chapter
  • January 2022

Lecture Notes in Computer Science

... 1. Obfuscation of Tor flows: Traffic obfuscators [9,22,80] that aim to prevent the detection of Tor usage can help users defending against SUMo. Previous studies [62,84] reveal that obfuscation mechanisms like obfs4 [5] can hinder the precision of correlation attacks on Tor; e.g., Tian et. al. [79] showed that DeepCorr's true positive rate decreased from 82% to 60% by applying obfs4-based perturbations. ...

Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario
  • Citing Conference Paper
  • December 2021