Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design

نویسندگان

  • Rishab Nithyanand
  • Rachee Singh
  • Shinyoung Cho
  • Phillipa Gill
چکیده

Traffic correlation attacks to de-anonymize Tor users are possible when an adversary is in a position to observe traffic entering and exiting the Tor network. Recent work has brought attention to the threat of these attacks by network-level adversaries (e.g., Autonomous Systems). We perform a historical analysis to understand how the threat from AS-level traffic correlation attacks has evolved over the past five years. We find that despite a large number of new relays added to the Tor network, the threat has grown. This points to the importance of increasing AS-level diversity in addition to capacity of the Tor network. We identify and elaborate on common pitfalls of AS-aware Tor client design and construction. We find that succumbing to these pitfalls can negatively impact three major aspects of an AS-aware Tor client – (1) security against AS-level adversaries, (2) security against relay-level adversaries, and (3) performance. Finally, we propose and evaluate a Tor client – Cipollino– which avoids these pitfalls using state-ofthe-art in network-measurement. Our evaluation shows that Cipollino is able to achieve better security against networklevel adversaries while maintaining security against relaylevel adversaries and performance characteristics comparable to the current Tor client.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DeNASA: Destination-Naive AS-Awareness in Anonymous Communications

Prior approaches to AS-aware path selection in Tor do not consider node bandwidth or the other characteristics that Tor uses to ensure load balancing and quality of service. Further, since the AS path from the client’s exit to her destination can only be inferred once the destination is known, the prior approaches may have problems constructing circuits in advance, which is important for Tor pe...

متن کامل

Location-Aware Onion Routing

The Tor network provides low-latency anonymous communication to over two million users daily. To be practical for widespread use, Tor uses onion routing, which does not protect a user against an adversary that can observe a user’s traffic at certain vulnerable positions along the traffic’s route through the Internet. A natural defense would be to choose Tor relays to minimize the chance that th...

متن کامل

The Effect of DNS on Tor's Anonymity

Previous attacks that link the sender and receiver of traffic in the Tor network (“correlation attacks”) have generally relied on analyzing traffic from TCP connections. The TCP connections of a typical client application, however, are often accompanied by DNS requests and responses. This additional traffic presents more opportunities for correlation attacks. This paper quantifies how DNS traff...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

Identifying factors affecting hospital holding administration in Social Security Organization in Iran using Structural Equations Modeling

Introduction: Hospitals, major components of health system, have a high contribution to healthcare resources. Therefore, considering the importance of hospital holding in effective and efficient hospital management, the current study aimed to identify and explain the role and importance of factors affecting hospital holding administration in Iran Social Security Organization. Methods: This was...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1605.03596  شماره 

صفحات  -

تاریخ انتشار 2016