Analyzing the Effectiveness of Passive Correlation Attacks on the Tor Anonymity Network
نویسندگان
چکیده
Tor is a widely used low-latency anonymity system. It allows users of web browsers, chat clients, and other common low-latency applications to communicate anonymously online by routing their connection through a circuit of three Tor routers. However, Tor is commonly assumed to be vulnerable to a wide variety of attacks, which might allow Tor operators or outside observers to compromise the anonymity of Tor’s users. One of these attacks is an end-to-end correlation attack, whereby an attacker controlling the first and last router in a circuit can use timing and other data to correlate streams observed at those routers and therefore break Tor’s anonymity. Since most prior tests of correlation algorithms have been either in simulation or have only used certain kinds of traffic, our goal was to test how well these algorithms work on the deployed Tor network. In this thesis we tested three correlation algorithms. Two of these algorithms are from prior work, and the third was designed by us. Its design was based on observations and analyses of data we collected during the testing process. We found that while the two previously-existing algorithms we tested both have problems that prevent them being used in certain cases, our algorithm works reliably on all types of data.
منابع مشابه
Improving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملA STor: Social Network based Anonymous Communication in Tor
Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust ...
متن کاملTempest: Temporal Dynamics in Anonymity Systems
Many recent proposals for anonymous communication omit from their security analyses a consideration of the effects of time on important system components. In practice, many components of anonymity systems, such as the client location and network structure, exhibit changes and patterns over time. In this paper, we focus on the effect of such temporal dynamics on the security of anonymity network...
متن کاملSTor: Social Network based Anonymous Communication in Tor
Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymitynetworks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus makingthem susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based<...
متن کاملOne Fast Guard for Life (or 9 months)
“Entry Guards” in the Tor anonymity network mitigate against several traffic analysis attacks including the “predecessor” attack, statistical profiling, and passive AS-level correlation attacks. Several recent works have shown that the current design does not provide sufficient mitigation against these attacks and may also introduce new vulnerabilities. We propose a simple response to these res...
متن کامل