Tor traffic from individual Android apps detected with 97 percent accuracy

0
124
Android Tor

Image: ZDNet, Tor Project

Italian academics say they’ve developed an algorithm that can detect the patterns of Android app activity inside Tor traffic with an accuracy of 97 percent.

The algorithm isn’t a deanonymization script, as it can’t reveal a user’s real IP address or other identifying details. However, it will reveal if a Tor user is using an Android app.

The work of researchers from the Sapienza University of Rome in Italy builds upon previous research that was able to analyze the TCP packet flows of Tor traffic and distinguish between eight traffic types: browsing, email, chat, audio streaming, video streaming, file transfers, VoIP, and P2P.

For their work, the Italian researchers applied a similar concept of analyzing the TCP packets flowing through a Tor connection to detect patterns specific to certain Android apps.

They then developed a machine learning algorithm that they trained with the Tor traffic patterns of ten apps: the Tor Browser Android app, Instagram, Facebook, Skype, uTorrent, Spotify, Twitch, YouTube, DailyMotion, and Replaio Radio.

With the algorithm trained, they were then able to point it at Tor traffic and detect whenever the user was utilizing one of the ten apps. Test results showed an algorithm accuracy of 97.3 percent.

However, the mechanism they devised isn’t as perfect and efficient as it sounds. For starters, it can only be used when there’s no background traffic noise on the communication channel, meaning it only works when the user is using his mobile device with one app, and nothing else.

If there are too many apps communicating at the same time in the phone’s background, TCP traffic patterns get muddled up, and the algorithm’s efficiency drops.

Second, there are also still issues with the accuracy of some results. For example, streaming-based apps such as Spotify or YouTube produce similar traffic patterns, leading to false positives.

There’s also an issue with the long “idle” periods for apps such as Facebook, Instagram, and the Tor Browser app, as user activity goes silent as they go through the accessed content.

As future experiments will factor in more apps, similar issues will pop up, increasing the chance of false positives and reducing the overall accuracy.

More details are available in their research paper released last month and named “Peel the onion: Recognition of Android apps behind the Tor Network.” Researchers said they plan to release the code of their algorithm.

Related security coverage:

Microsoft removes eight cryptojacking apps from official storeDirty Sock vulnerability lets attackers gain root access on Linux systemsGoogle is running an auto-update-to-HTTPS experiment in Chrome
Another WordPress commercial plugin gets exploited in the wildWhite hats spread VKontakte worm after social network doesn’t pay bug bounty
Hacker puts up for sale third round of hacked databases on the Dark Web
Why deepfakes are a real threat to elections and society TechRepublicGoogle bans cryptocurrency mining extensions for Chrome CNET

Related Topics:

Mobility

Security TV

Data Management

CXO

Data Centers