Skip to main content
Log in

Deepflow: Hiding anonymous communication traffic in P2P streaming networks

  • Security of Network
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

The anonymous communication systems usually have special traffic patterns, which can be detected by censors for further disturbing or blocking. To solve this problem, we present a novel system, Deepflow, to hide anonymous communication traffic into the P2P streaming networks such as PPStream by using steganography. Each Deepflow node joins the PPStream network and performs like a normal PPStream client watching a live channel, while embedding communication data into video packets transferred in the network. The steganographed video packets are disseminated by innocuous PPStream clients and reach the target Deepflow node. It is not necessary for Deepflow nodes to link together in the network, which prevents malicious users from sensing IP address of other Deepflow nodes. Deepflow is competent for secret chatting, transferring text documents, or publishing secret bootstrapping information for other anonymous communication systems. Comprehensive experiments in real network environments are conducted in this paper to show the security and efficiency of Deepflow.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Burnett S, Feamster N. Making Sense of Internet Censorship: A new frontier for Internet measurement [J]. Computer Communication Review, 2013, 43(3): 84–89.

    Article  Google Scholar 

  2. Dingledine R, Mathewson N, Syverson P. Tor: The second-generation onion router [C]// Proc 13th USENIX Security Symposium. San Diego: USENIX Press, 2004: 303–320.

    Google Scholar 

  3. Reiter M, Rubin A. Crowds: Anonymity for Web transactions [J]. ACM Trans Information and System Security, 1998, 1(1): 66–92.

    Article  Google Scholar 

  4. Freedman M, Morris R. Tarzan: A peer-to-peer anonymizing network layer [C]// Proc 9th ACM Conference Computer and Communications Security. Washington D C: ACM Press, 2002: 193–206.

    Google Scholar 

  5. Rennhard M, Plattner B. Introducing morphmix: Peer-to-Peer based anonymous Internet usage with collusion detection [C]// Proc ACM Workshop on Privacy in the Electronic Society. Washington D C: ACM Press, 2002: 91–102.

    Chapter  Google Scholar 

  6. Nambiar A, Wright M. Salsa: A structured approach to large-scale anonymity [C]// Proc 13th ACM Conference Computer and Communications Security. Alexandria: ACM Press, 2006: 17–26.

    Google Scholar 

  7. Mittal P, Borisov N. Shadowwalker: Peer-to-Peer anonymous communication using redundant structured topologies [C] //Proc 16th ACM Conference Computer and Communications Security. Chicago: ACM Press, 2009: 161–172.

    Google Scholar 

  8. Panchenko A, Richter S, Rache A. Nisan: Network information service for anonymization networks [C]// Proc 16th ACM Conference Computer and Communications Security. Chicago: ACM Press, 2009: 141–150.

    Google Scholar 

  9. McLachlan J, Tran A, Hopper N, et al. Scalable onion routing with Torsk [C]// Proc 16th ACM Conference Computer and Communications Security. Chicago: ACM Press, 2009: 590–599.

    Google Scholar 

  10. Liu Y, Han J, Wang J. Rumor Riding: Anonymizing unstructured Peer-to-Peer systems [J]. IEEE Trans Parallel and Distributed Systems, 2011, 22(3): 464–475.

    Article  CAS  Google Scholar 

  11. Tor Project. Tor bridges specification[EB/OL]. [2014-04-10]. https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=attic/bridges-spec.txt.

  12. Kopsell S, Hillig U. How to achieve blocking resistance for existing systems enabling anonymous web surfing [C] //Proc ACM Workshop on Privacy in the Electronic Society. Washington D C: ACM Press, 2004: 47–58.

    Google Scholar 

  13. Feamster N, Balazinska M, Harfst G, et al. Infranet: Circumventing web censorship and surveillance [C] //Proc 11th USENIX Security Symposium. San Francisco: USENIX Press, 2002: 247–262.

    Google Scholar 

  14. Wiley B. Dust: A blocking-resistant Internet transport protocol [EB/OL]. [2014-03-26]. http://blanu.net/Dust.pdf.

  15. Weinberg Z, Wang J, Yegneswaran V, et al. StegoTorus: A camouflage proxy for the Tor anonymity system [C] //Proc 19th ACM Conference on Computer and Communications Security. Raleigh: ACM Press, 2012: 109–120.

    Google Scholar 

  16. Moghaddam H, Li B, Derakhshani M, et al. SkypeMorph: Protocol obfuscation for Tor bridges [C]// Proc 19th ACM Conference on Computer and Communications Security. Raleigh: ACM Press, 2012: 97–108.

    Google Scholar 

  17. Skype Inc. Skype homepage [EB/OL]. [2014-04-08]. http://skype.com.

  18. PPStream Inc. PPStream homepage [EB/OL]. [2014-03-29]. http://www.pps.tv.

  19. Burnett S, Feamster N, Vempala S. Chipping away at censorship firewalls with user-generated content [C] //Proc 19th USENIX Security Symposium. Washington D C: USENIX Press, 2010: 453–468.

    Google Scholar 

  20. Lewman A. China blocking Tor: Round two [EB/OL]. [2014-03-26]. https://blog.torproject.org/blog/china-blocking-tor-round-two.

  21. PPLive Inc. PPLive homepage [EB/OL]. [2014-04-10]. http://www.pplive.com.

  22. Joost Inc. Joost homepage [EB/OL]. [2014-04-12]. http://joost.com.

  23. Mobasseri B, Raikar Y. Authentication of H.264 streams by direct watermarking of CAVLC blocks [C]//Proc SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX. San Jose: SPIE Press, 2007:1–5.

    Google Scholar 

  24. Richardson I. H.264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia [M]. Chichester: Wiley Press, 2003.

    Book  Google Scholar 

  25. Dhungel P, Hei X, Ross K, et al. The pollution attack in P2P live video streaming: Measurement results and defenses [C] //Proc Workshop on Peer-to-Peer Streaming and IP-TV. Kyoto: ACM Press, 2007: 323–328.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianming Lv.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61300221), the Fundamental Research Funds for the Central Universities( 2014ZZ0038), the Comprehensive Strategic Cooperation Project of Guangdong Province and Chinese Academy of Sciences (2012B090400016) and the Technology Planning Project of Guangdong Province (2012 A011100005)

Biography: LV Jianming, male, Lecturer, Ph.D., research direction: Peer-to-Peer computing, big data, security and privacy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lv, J., Zhu, C., Tang, S. et al. Deepflow: Hiding anonymous communication traffic in P2P streaming networks. Wuhan Univ. J. Nat. Sci. 19, 417–425 (2014). https://doi.org/10.1007/s11859-014-1034-0

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-014-1034-0

Key words

CLC number

Navigation