Improving Tor security against timing and traffic analysis attacks with fair randomization
Authors
Abstract:
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and traffic analysis attacks, which are the most dominant attacks on Tor network in recent past years. In this paper, first all kinds of attacks on Tor network will be classified and then timing and traffic analysis attacks will be described in more details. Then we present a new circuit scheduling for Tor network in order to preserve two properties, fairness and randomness. Both properties are trying to make pattern and timing analysis attacks more difficult and even in some cases impractical. Our scheduler distorts timing patterns and size of packets in a random way (randomness) without imposing artificial delays or paddings (fairness). Finally, by using our new scheduler, one of the most powerful attacks in this area is debilitated, and by it is shown that analyzing traffic patterns and size of packets will be more difficult to manage.
similar resources
Protocol-level attacks against Tor
Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications over the Internet. In this paper, we present an extensive study of protocol-level attacks against Tor. Different from existing attacks, the attacks investigated in this paper can confirm anonymous communication relationships quickly and accurately by manipulating one single cell and pose ...
full textLocation Privacy against Traffic Analysis Attacks
We propose a method which provides location privacy against traffic analysis attacks. Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be described as the passive attacks that try to deduce the traffic pattern based on the eavesdropped information. They launch an active attack according to the achieved i...
full textTiming attacks against OpenSSL
OpenSSL is the most widely used open source SSL/TLS implementation on the internet and an immense amount of sensitive communication is trusted to be secured by it. The related cryptographic algorithms themselves are indeed very secure. However implementing the models in hardware or software introduces new kinds of channels that are not present in the mathematical model, but which can nonetheles...
full textA First-Hop Traffic Analysis Attack Against Tor
We introduce an attack against encrypted web traffic passing over the first hop – between client and Tor gateway – of the Tor network. The attack makes use only of packet timing information on the uplink and so is impervious to packet padding defences. In addition, we show that the attack is robust against the randomised routing used in Tor. We demonstrate the effectiveness of the attack at ide...
full textTimingCamouflage: Improving Circuit Security against Counterfeiting by Unconventional Timing
With recent advances in reverse engineering, attackers can reconstruct a netlist to counterfeit chips by opening the die and scanning all layers of original chips. This relatively easy counterfeiting is made possible by the use of the standard simple clocking scheme where all combinational blocks function within one clock period. In this paper, we propose a method to invalidate the assumption t...
full textOn Making Encrypted Web Traffic Resistant to Timing-Analysis Attacks
In this paper we introduce a trace-based tunnel that is resistant to traffic analysis in the sense that it provides deniability to users that a specific web page was fetched given that a packet trace is observed on the tunnel. We present a scheduler design for managing the transmission of traces to satisfy user traffic demand while maintaining reasonably low delay and throughput overhead due to...
full textMy Resources
Journal title
volume 6 issue 1
pages 67- 76
publication date 2014-01-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023