Zeyu Li’s research while affiliated with Beijing University of Posts and Telecommunications and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (9)


Figure 2. Tor network simulation environment based on K8s. * represents the components of K8s, of which etcd is the database that stores the state of the entire cluster; apiserver provides the only entry point for users to operate resources; controller-manager is responsible for maintaining the state of the cluster; scheduler is responsible for scheduling Pods to the appropriate machines according to a predefined scheduling policy; kubelet is responsible for maintaining the container lifecycle, as well as Volume (CVI) and network (CNI) management.
Figure 4. Private Tor network organization process.
Figure 5. Circuit Association and Hidden Service Traceability Scenario Diagram.
Figure 6. Architectural Design of the Tor Network Simulation Method Based on Hybrid Networking of Multi-granularity Relays.
Table of the experimental environment.

+2

K8s-enhanced lightweight simulation method for the Tor network
  • Article
  • Full-text available

March 2025

·

29 Reads

Wentao Huang

·

Han Wu

·

Zeyu Li

·

[...]

·

Jinqiao Shi

Criminals exploit the robust anonymity afforded by Tor for illicit purposes, prompting heightened interest among researchers in de-anonymization attacks on the Tor network. The execution of experiments on de-anonymization attacks within a real Tor network presents considerable challenges, hence the necessity for a simulation environment. However, existing methods for simulating the Tor network are inadequate regarding realism, flexibility, and scalability, with some being prohibitively expensive. In this paper, we develop a lightweight and scalable Tor network simulation environment based on Kubernetes (K8s), employing Docker containers to simulate Tor relays. The results demonstrate that a network of up to a thousand Tor relays can be simulated using just four standard hosts. Furthermore, two de-anonymization attack experiments were conducted within this simulated environment, which exhibited high levels of realism and flexibility. Finally, a hybrid networking approach combining multi-granularity relays was explored to enhance further the balance between realism and cost in Tor network simulations.

Download




Efficient Classification of Darknet Access Activity with Partial Traffic

January 2022

·

71 Reads

Communications in Computer and Information Science

In this paper we propose a novel approach to classify darknet-access traffic with only partial traffic data, which significantly reduces resource consumption and is as accuracy as prior work. Besides, in order to keep up with the users’ real access activity, we simulate new and old user by simply whether delete the cached consensus document before each access and apply our approach. The experiment results confirm that there does exist a window of cell sequence contributes greatly to distinguish darknet-access traffic. With the window size 75 and the start point 67, we can achieve 95.97% accuracy for new user access scenario. Similarly, with the window size 85 and the start point 44, we achieve 94.43% accuracy for old user access scenario.


Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence

January 2022

·

31 Reads

·

3 Citations

Lecture Notes in Computer Science

Tor enables end user the desirable cyber anonymity with obfuscation technologies like MEEK. However, it has also manifested itself a wide shield for various illegal hidden services involved cyber criminals, motivating the urgent need of deanonymization technologies. In this paper, we propose a novel communication fingerprint abstracted from key packet sequences, and attempt to efficiently identify end users MEEK-based access to Tor hidden services. Specifically, we investigate the communication fingerprint during the early connection stage of MEEK-based Tor rendezvous establishment, and make use of deep neural network to automatically learn and form a key packet sequence. Unlike most of existing approaches that rely on the entire long communication packet sequence, experiments demonstrate that our key packet sequence enabled scheme can significantly reduce both the time and hardware resource consumption for the identification task by 23%–37% and 80%–86%, respectively, while being able to keep a slightly better accuracy.KeywordsTorHidden serviceTraffic analysisMEEK




Citations (5)


... Xu et al. [40] propose Zoomer, which extracts traffic features that are more useful for website fingerprinting. Wang et al. [41] further address the lack of training data when fingerprinting hidden services. Active attacks primarily use the watermarking method [18-20, 42, 43], whereby the attacker creates a watermark by injecting, modifying, and deleting traffic and transmits the watermark to the target hidden service via the onion proxy. ...

Reference:

K8s-enhanced lightweight simulation method for the Tor network
Deanonymize Tor Hidden Services Using Remote Website Fingerprinting
  • Citing Conference Paper
  • November 2023

... [16] for the popular anonymizing web browser, The Onion Router (Tor), that allows users to obfuscate their web traffic using domain fronted connections to existing MEEK servers provided by UC Berkeley in both the Amazon and Google CDNs. Since the release of this paper, MEEK has become widely used as a Tor into the detection and prevention of domain fronted traffic through the MEEK pluggable [11], [13], [18], [20]. These innovations in detection/prevention are typically neural ne no Deep Packet Inspection [20]. ...

Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence
  • Citing Chapter
  • January 2022

Lecture Notes in Computer Science

... Their work explored different randomized obfuscation methods, including random padding and random inter-arrival time (IAT). Li [15] studied the C2 communication traffic of botnets using domain fronting technology. They proposed a recognition method based on convolutional neural networks (CNN). ...

Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications
  • Citing Conference Paper
  • October 2021

... Hongcheng Zou et al. [98] presented Probabilistic Fingerprinting (PF), a new WF attack based on kNN, using topic probability vectors of traffic instances as features. Kexin Zou et al. [99] proposed a novel lightweight WF attack on Bitcoin hidden service, using a random decision forest classifier with features from TLS packet size and direction. ...

Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service Detection
  • Citing Conference Paper
  • October 2021

... 1. Obfuscation of Tor flows: Traffic obfuscators [9,22,80] that aim to prevent the detection of Tor usage can help users defending against SUMo. Previous studies [62,84] reveal that obfuscation mechanisms like obfs4 [5] can hinder the precision of correlation attacks on Tor; e.g., Tian et. al. [79] showed that DeepCorr's true positive rate decreased from 82% to 60% by applying obfs4-based perturbations. ...

Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario
  • Citing Conference Paper
  • December 2021