Traffic Analysis of High Throughput Traffic on Tor

被引:1
|
作者
Mani, G. [1 ]
Srinivas, P. V. V. S. [2 ]
Rao, Ganga Rama Koteswara [2 ]
Prasad, Chitturi [3 ]
Priyanka, Donepudi [4 ]
Cherukuri, Naresh [5 ]
机构
[1] Vignans Inst Informat Technol Autonomous, Dept Informat Technol, Visakhapatnam 5300460, Andhra Pradesh, India
[2] Koneru Lakshmaiah Educ Fdn, Dept CSIT, Vaddeswaram 522502, AP, India
[3] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram 522502, AP, India
[4] Gudlavalleru Engn Coll, Dept CSE, Gudlavalleru 521356, AP, India
[5] Bapatla Engn Coll, Dept CSE, Bapatla 522502, AP, India
关键词
round trip time (RTT); attacks; Tor privacy; attackers; susceptible;
D O I
10.1109/I-SMAC52330.2021.9640934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tor is a popular anonymity network used by millions to access intemet services while maintaining their privacy. The main concept behind Tor is that a user can build a "circuit" of routers called relays, where each relay carries the client's traffic to the next relay, without any single relay knowing the full extent of the path. Thus, anonymity is achieved, because no single relay can trace the client to the destination. However, a paper written in 2005 titled "Low-Cost Traffic Analysis of Tor" by Steven J. Murdoch and George Danez is demonstrated that a traffic analysis attack was possible against the Tor network. Any attacker could monitor the load on a relay in the Tor network calculating the round trip time (RTT) to the relay, and when the RTT spiked, it was clear that the relay was being used. With this information, attackers could trace the path of a client in the Tor network and de-anonymize them. This paper was written in 2005, when Tor was stillyoung. At the time of Murdoch and Danezis' paper, the entire Tor network consisted of just fifty relays. As of the time of writing, there were well over 7,000 relays in the network, so the ecosystem of Tor is radically different. With all of the increased traffic, it is highly required to determine if this type of attack was still valid, and would not bemasked by other traffic. Our results indicate that if a victim is downloading or streaming a large file as fast as Tor will allow them to, a decrease in bandwidth and an increase in round trip time (RTT) is usually observable on each relay in the circuit. This research work has also discovered the Tor guard relays, a special subset of relays that clients will pick as the first hop in their circuit are very susceptible to this kind of attack.
引用
收藏
页码:844 / 849
页数:6
相关论文
共 50 条
  • [1] Tor Traffic Analysis and Identification
    Mercaldo, Francesco
    Martinelli, Fabio
    2017 AEIT INTERNATIONAL ANNUAL CONFERENCE, 2017,
  • [2] Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification
    Karunanayake, Ishan
    Ahmed, Nadeem
    Malaney, Robert
    Islam, Rafiqul
    Jha, Sanjay K.
    IEEE ACCESS, 2023, 11 : 70011 - 70022
  • [3] Tor Traffic Identification
    Mayank, Priya
    Singh, A. K.
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 85 - 91
  • [4] Low-cost traffic analysis of Tor
    Murdoch, SJ
    Danezis, G
    2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 183 - 195
  • [5] Traffic Flow Analysis of Tor Pluggable Transports
    Shahbar, Khalid
    Zincir-Heywood, A. Nur
    2015 11TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2015, : 178 - 181
  • [6] Malicious DNS Traffic in Tor: Analysis and Countermeasures
    Sonntag, Michael
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 536 - 543
  • [7] DNS Traffic of a Tor Exit Node - An Analysis
    Sonntag, Michael
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 33 - 45
  • [8] DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
    Kohls, Katharina
    Popper, Christina
    COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 512 - 530
  • [9] Tor traffic analysis using Hidden Markov Models
    Zhioua, Sami
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1075 - 1086
  • [10] Traffic Statistics of a High-Bandwidth Tor Exit Node
    Sonntag, Michael
    Mayrhofer, Rene
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 270 - 277