TorFlow: Tor Network Analysis

نویسنده

  • Mike Perry
چکیده

The Tor Network is a low-latency anonymity, privacy, and censorship resistance network whose servers are run by volunteers around the Internet. This distribution of trust creates resilience in the face of compromise and censorship; but it also creates performance, security, and usability issues. The TorFlow suite attempts to address this by providing a library and associated tools for measuring Tor nodes for reliability, capacity and integrity, with the ultimate goal of feeding these measurements back into the Tor directory authorities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

PeerFlow: Secure Load Balancing in Tor

We present PeerFlow, a system to securely load balance client traffic in Tor. Security in Tor requires that no adversary handle too much traffic. However, Tor relays are run by volunteers who cannot be trusted to report the relay bandwidths, which Tor clients use for load balancing. We show that existing methods to determine the bandwidths of Tor relays allow an adversary with little bandwidth ...

متن کامل

First Glance: An Introductory Analysis of Network Forensics of Tor

The Tor network is a low-latency overlay network for TCP flows that is designed to provide privacy and anonymity to its users. It is currently in use by many as a means to avoid censorship of both information to be shared and information to be retrieved. This paper details the architecture of the Tor network as a platform for evaluating the current state of forensic analysis of the Tor network....

متن کامل

OSINT Analysis of the TOR Foundation

This research paper is a study on the TOR Foundation and the TOR Network. Due to the blind confidence over this network and this foundation we have collect data and gather information in open sources to understand how it is organized. We discovered that the US government is very active through the financial aspect and development aspect. Furthermore, we discovered that some critical points of t...

متن کامل

A First-Hop Traffic Analysis Attack Against Tor

We introduce an attack against encrypted web traffic passing over the first hop – between client and Tor gateway – of the Tor network. The attack makes use only of packet timing information on the uplink and so is impervious to packet padding defences. In addition, we show that the attack is robust against the randomised routing used in Tor. We demonstrate the effectiveness of the attack at ide...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009