De-anonymizing BitTorrent Users on Tor

نویسندگان

  • Stevens Le Blond
  • Pere Manils
  • Chaabane Abdelberi
  • Mohamed Ali Kâafar
  • Arnaud Legout
  • Claude Castelluccia
  • Walid Dabbous
چکیده

Privacy of users in Peer-to-peer (P2P) networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between P2P filesharing users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol often leaks information that compromises the identity of its users. BitTorrent is a P2P filesharing protocol that is daily used by millions of users but that has not been designed to protect the anonymity of its users. Indeed, it has recently been shown that an adversary can continuously spy, i.e., collect the IP-to-contents mapping, on most BitTorrent users of the Internet and from a single machine [1]. In addition to spy on BitTorrent users, an attacker might be able to exploit BitTorrent control messages to de-anonymize a user behind an anonymizing network such as Tor. Tor relies on onion routing over an overlay network maintained by volunteers to anonymize TCP applications such as web browsing, P2P filesharing, etc. To reach the Internet via Tor, an application selects 3 Tor nodes at random and then first encrypts its messages with the key shared with the last node (exit node), then with the key of the 2nd node, and finally with the key of the 1st node. The 3 Tor nodes that route a user’s messages form a circuit and all TCP streams created by that user during a 10-minutes period will be multiplexed into one, or a few circuits. Each Tor node in a circuit then decrypts/encrypts the messages after routing them to/from the Internet. Onion routing thus guarantees that no Tor node knows both the source IP address and the payload of a message. A BitTorrent user may use Tor to (1) connect to a server (tracker) to collect lists of peers sharing a file, (2) connect to other peers to distribute a file, or (3) both. In this proposal, we instrument 6 exit nodes for a period of 23 days to demonstrate that an attacker can deanonymize BitTorrent users for any of the 3 aforementioned usages by volunteering to maintain an exit node and eavesdropping appropriate BitTorrent control messages. In addition, as all streams are multiplexed into the same circuit, we show that de-anonymizing one Bit-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compromising Tor Anonymity Exploiting P2P Information Leakage

Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak ...

متن کامل

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in pra...

متن کامل

Web search query privacy: Evaluating query obfuscation and anonymizing networks

Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines – of logging and analyzing users’ queries – raises serious privacy concerns. In this paper, we concentrate on two existing solutions which are relatively easy to deploy – namely Query Obfuscation and Anonymizing Networks. In query obfuscation, a client-...

متن کامل

A Practical Approach to Tranparent und Usable Anonymity Networks

This paper presents an approach to enhance the usability of anonymizing networks, by creating a virtual anonymous IP-network. Users are able to communicate as usual with additional protection of their privacy. We combine the deployed Tor anonymizing network with virtual private networking – this allows for transparent use of TCP applications or IP services. Support for typical services on IPs, ...

متن کامل

Design of a blocking-resistant anonymity system

Internet censorship is on the rise as websites around the world are increasingly blocked by government-level firewalls. Although popular anonymizing networks like Tor were originally designed to keep attackers from tracing people’s activities, many people are also using them to evade local censorship. But if the censor simply denies access to the Tor network itself, blocked users can no longer ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1004.1267  شماره 

صفحات  -

تاریخ انتشار 2010