Breaking Tor anonymity with game theory and data mining

被引:4
|
作者
Wagner, Cynthia [1 ]
Wagener, Gerard [2 ]
State, Radu [1 ]
Dulaunoy, Alexandre [2 ]
Engel, Thomas [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, L-1359 Luxembourg, Luxembourg
[2] CIRCL Comp Incident Response Ctr Luxembourg, L-5326 Luxembourg, Luxembourg
来源
关键词
Tor network; anonymity; attacks; game theory; data mining;
D O I
10.1002/cpe.1828
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Attacking anonymous communication networks is very tempting, and many types of attacks have already been observed. In the case for Tor, a widely used anonymous overlay network is considered. Despite the deployment of several protection mechanisms, an attack originated by just one rogue exit node is proposed. The attack is composed of two elements. The first is an active tag injection scheme. The malicious exit node injects image tags into all HTTP replies, which will be cached for upcoming requests and allow different users to be distinguished. The second element is an inference attack that leverages a semi-supervised learning algorithm to reconstruct browsing sessions. Captured traffic flows are clustered into sessions, such that one session is most probably associated to a specific user. The clustering algorithm uses HTTP headers and logical dependencies encountered in a browsing session. A prototype has been implemented and its performance evaluated on the Tor network. The article also describes several countermeasures and advanced attacks, modeled in a game theoretical framework, and their effectiveness assessed with reference to the Nash equilibrium. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:1052 / 1065
页数:14
相关论文
共 50 条
  • [1] Breaking Tor's Anonymity by Modifying Cell's Command
    Qin, Yi
    Wu, Jiahe
    Zou, Futai
    Wu, Yue
    [J]. 2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,
  • [2] Anonymity and data mining
    Atzori, M
    Bonchi, F
    Giannotti, F
    Pedreschi, D
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (05): : 369 - 376
  • [3] Integration of Data Mining with Game Theory
    Wang, Yi
    [J]. Knowledge Enterprise: Intelligent Strategies in Product Design, Manufacturing, and Management, 2006, 207 : 275 - 280
  • [4] Anonymity meets game theory: secure data integration with malicious participants
    Mohammed, Noman
    Fung, Benjamin C. M.
    Debbabi, Mourad
    [J]. VLDB JOURNAL, 2011, 20 (04): : 567 - 588
  • [5] A framework for data mining on combinatorial game theory
    Hooks, David
    Ding, Qin
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2009, 9 (01) : S91 - S98
  • [6] Anonymity meets game theory: secure data integration with malicious participants
    Noman Mohammed
    Benjamin C. M. Fung
    Mourad Debbabi
    [J]. The VLDB Journal, 2011, 20 : 567 - 588
  • [7] A-Tor: Accountable Anonymity in Tor
    Cai, Quanwei
    Lutes, Jonathan
    Lin, Jingqiang
    Luo, Bo
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 838 - 851
  • [8] An Anonymity Vulnerability in Tor
    Tan, Qingfeng
    Wang, Xuebin
    Shi, Wei
    Tang, Jian
    Tian, Zhihong
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (06) : 2574 - 2587
  • [9] A Case Study on Measuring Statistical Data in the Tor Anonymity Network
    Loesing, Karsten
    Murdoch, Steven J.
    Dingledine, Roger
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 203 - 215
  • [10] Tor network anonymity evaluation based on node anonymity
    Cui, Jun
    Huang, Changqi
    Meng, Huan
    Wei, Ran
    [J]. CYBERSECURITY, 2023, 6 (01)