Revisiting Circuit Clogging Attacks on Tor

作者: Eric Chan-Tin , Jiyoung Shin , Jiangmin Yu

DOI: 10.1109/ARES.2013.17

关键词:

摘要: Tor is a popular anonymity-providing network used by over 500,000 users daily. The made up of volunteer relays. To anonymously connect to server, user first creates circuit, consisting three relays, and routes traffic through these proxies before connecting the server. client thus hidden from server proxies. If could be identified, anonymity would reduced. One particular way identifying relays in circuit perform clogging attack. This attack requires malicious (malicious content, such as an advertising frame, can hosted on server). alternates between sending bursts data little traffic. During burst period, will take longer relay due increase processing time for extra messages. are continuously monitored latency probes, indicates that this likely being circuit. We show, experiments real network, identified. A detection scheme also proposed clients determine whether happening. costs both mechanism small feasible current network.

参考文章(16)
Roger Dingledine, Nathan S. Evans, Christian Grothoff, A practical congestion attack on tor using long paths usenix security symposium. pp. 33- 50 ,(2009)
Marc Rennhard, Bernhard Plattner, Practical Anonymity for the Masses with MorphMix financial cryptography. pp. 233- 250 ,(2004) , 10.1007/978-3-540-27809-2_24
Vitaly Shmatikov, Ming-Hsiu Wang, Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses Computer Security – ESORICS 2006. pp. 18- 33 ,(2006) , 10.1007/11863908_2
David M. Goldschlag, Michael G. Reed, Paul F. Syverson, Hiding Routing Information information hiding. ,vol. 1174, pp. 137- 150 ,(1996) , 10.1007/3-540-61996-8_37
Yossi Gilad, Amir Herzberg, Spying in the dark: TCP and tor traffic analysis privacy enhancing technologies. pp. 100- 119 ,(2012) , 10.1007/978-3-642-31680-7_6
Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov, Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 215- 226 ,(2011) , 10.1145/2046707.2046732
Marc Rennhard, Bernhard Plattner, Introducing MorphMix Proceeding of the ACM workshop on Privacy in the Electronic Society - WPES '02. pp. 91- 102 ,(2002) , 10.1145/644527.644537
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-TIN, How much anonymity does network latency leak ACM Transactions on Information and System Security. ,vol. 13, pp. 13- ,(2010) , 10.1145/1698750.1698753
S.J. Murdoch, G. Danezis, Low-cost traffic analysis of Tor ieee symposium on security and privacy. pp. 183- 195 ,(2005) , 10.1109/SP.2005.12
Jon McLachlan, Nicholas Hopper, Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes financial cryptography. pp. 31- 46 ,(2008) , 10.1007/978-3-540-85230-8_3