About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I

Research Article

The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-63086-7_10,
        author={Fatemeh Rezaei and Shahrzad Naseri and Ittay Eyal and Amir Houmansadr},
        title={The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels},
        proceedings={Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I},
        proceedings_a={SECURECOMM},
        year={2020},
        month={12},
        keywords={Bitcoin Traffic analysis Blocking-resistance},
        doi={10.1007/978-3-030-63086-7_10}
    }
    
  • Fatemeh Rezaei
    Shahrzad Naseri
    Ittay Eyal
    Amir Houmansadr
    Year: 2020
    The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-030-63086-7_10
Fatemeh Rezaei,*, Shahrzad Naseri, Ittay Eyal, Amir Houmansadr
    *Contact email: frezaei@cs.umass.edu

    Abstract

    Bitcoin and similar blockchain-based currencies are significant to consumers and industry because of their applications in electronic commerce and other trust-based distributed systems. Therefore, it is of paramount importance to the consumers and industry to maintain reliable access to their Bitcoin assets. In this paper, we investigate the resilience of Bitcoin to blocking by the powerful network entities such as ISPs and governments. By characterizing Bitcoin’s communication patterns, we design classifiers that can distinguish (and therefore block) Bitcoin traffic even if it is tunneled through an encrypted channel like Tor and even if Bitcoin traffic is being mixed with background traffic, e.g., due to browsing websites. We perform extensive experiments to demonstrate the reliability of our classifiers in identifying Bitcoin traffic even despite using obfuscation protocols like Tor Pluggable Ttransports. We conclude that standard obfuscation mechanisms are not enough to ensure blocking-resilient access to Bitcoin (and similar cryptocurrencies), therefore cryptocurrency operators should deploy tailored traffic obfuscation mechanisms.

    Keywords
    Bitcoin Traffic analysis Blocking-resistance
    Published
    2020-12-12
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-030-63086-7_10
    Copyright © 2020–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL