The bitcoin hunter: Detecting bitcoin traffic over encrypted channels

Fatemeh Rezaei, Shahrzad Naseri, Ittay Eyal, Amir Houmansadr

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Bitcoin and similar blockchain-based currencies are significant to consumers and industry because of their applications in electronic commerce and other trust-based distributed systems. Therefore, it is of paramount importance to the consumers and industry to maintain reliable access to their Bitcoin assets. In this paper, we investigate the resilience of Bitcoin to blocking by the powerful network entities such as ISPs and governments. By characterizing Bitcoin’s communication patterns, we design classifiers that can distinguish (and therefore block) Bitcoin traffic even if it is tunneled through an encrypted channel like Tor and even if Bitcoin traffic is being mixed with background traffic, e.g., due to browsing websites. We perform extensive experiments to demonstrate the reliability of our classifiers in identifying Bitcoin traffic even despite using obfuscation protocols like Tor Pluggable Ttransports. We conclude that standard obfuscation mechanisms are not enough to ensure blocking-resilient access to Bitcoin (and similar cryptocurrencies), therefore cryptocurrency operators should deploy tailored traffic obfuscation mechanisms.

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Proceedings
EditorsNoseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
PublisherSpringer Science and Business Media Deutschland GmbH
Pages152-171
Number of pages20
ISBN (Print)9783030630850
DOIs
StatePublished - 2020
Event16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020 - Washington, United States
Duration: 21 Oct 202023 Oct 2020

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume335

Conference

Conference16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020
Country/TerritoryUnited States
CityWashington
Period21/10/2023/10/20

Keywords

  • Bitcoin
  • Blocking-resistance
  • Traffic analysis

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'The bitcoin hunter: Detecting bitcoin traffic over encrypted channels'. Together they form a unique fingerprint.

Cite this