Traffic Analysis of High Throughput Traffic on Tor

被引:1
|
作者
Mani, G. [1 ]
Srinivas, P. V. V. S. [2 ]
Rao, Ganga Rama Koteswara [2 ]
Prasad, Chitturi [3 ]
Priyanka, Donepudi [4 ]
Cherukuri, Naresh [5 ]
机构
[1] Vignans Inst Informat Technol Autonomous, Dept Informat Technol, Visakhapatnam 5300460, Andhra Pradesh, India
[2] Koneru Lakshmaiah Educ Fdn, Dept CSIT, Vaddeswaram 522502, AP, India
[3] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram 522502, AP, India
[4] Gudlavalleru Engn Coll, Dept CSE, Gudlavalleru 521356, AP, India
[5] Bapatla Engn Coll, Dept CSE, Bapatla 522502, AP, India
关键词
round trip time (RTT); attacks; Tor privacy; attackers; susceptible;
D O I
10.1109/I-SMAC52330.2021.9640934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tor is a popular anonymity network used by millions to access intemet services while maintaining their privacy. The main concept behind Tor is that a user can build a "circuit" of routers called relays, where each relay carries the client's traffic to the next relay, without any single relay knowing the full extent of the path. Thus, anonymity is achieved, because no single relay can trace the client to the destination. However, a paper written in 2005 titled "Low-Cost Traffic Analysis of Tor" by Steven J. Murdoch and George Danez is demonstrated that a traffic analysis attack was possible against the Tor network. Any attacker could monitor the load on a relay in the Tor network calculating the round trip time (RTT) to the relay, and when the RTT spiked, it was clear that the relay was being used. With this information, attackers could trace the path of a client in the Tor network and de-anonymize them. This paper was written in 2005, when Tor was stillyoung. At the time of Murdoch and Danezis' paper, the entire Tor network consisted of just fifty relays. As of the time of writing, there were well over 7,000 relays in the network, so the ecosystem of Tor is radically different. With all of the increased traffic, it is highly required to determine if this type of attack was still valid, and would not bemasked by other traffic. Our results indicate that if a victim is downloading or streaming a large file as fast as Tor will allow them to, a decrease in bandwidth and an increase in round trip time (RTT) is usually observable on each relay in the circuit. This research work has also discovered the Tor guard relays, a special subset of relays that clients will pick as the first hop in their circuit are very susceptible to this kind of attack.
引用
收藏
页码:844 / 849
页数:6
相关论文
共 50 条
  • [21] An Analysis of Traffic and Throughput for UMTS Packet Core Networks
    Ouyang, Ye
    Fallah, M. Hosein
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2010, 2 (02)
  • [22] A Hierarchical Classification Approach for Tor Anonymous Traffic
    Jia Lingyu
    Liu Yang
    Wang Bailing
    Liu Hongri
    Xin Guodong
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 239 - 243
  • [23] A Traffic Splitting Algorithm for Load Balancing in Tor
    Meng, Xiance
    Liang, Mangui
    ENTROPY, 2022, 24 (06)
  • [24] Traffic Identification of Tor and Web-Mix
    Bai, Xuefeng
    Zhang, Yong
    Niu, Xiamu
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, : 548 - 551
  • [25] TorWard: Discovery of Malicious Traffic over Tor
    Ling, Zhen
    Luo, Junzhou
    Wu, Kui
    Yu, Wei
    Fu, Xinwen
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1402 - 1410
  • [26] TIGER: Tor Traffic Generator for Realistic Experiments
    Lopes, Daniela
    Castro, Daniel
    Barradas, Diogo
    Santos, Nuno
    PROCEEDINGS OF THE 22ND WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2023, 2023, : 147 - 152
  • [27] Detecting Traffic Snooping in Tor Using Decoys
    Chakravarty, Sambuddho
    Portokalidis, Georgios
    Polychronakis, Michalis
    Keromytis, Angelos D.
    RECENT ADVANCES IN INTRUSION DETECTION, 2011, 6961 : 222 - 241
  • [28] Throughput Analysis of Dynamic Multi-Hop Network Under High Traffic Load
    Sunada, Yusuke
    Adachi, Koichi
    Yamao, Yasushi
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 543 - 547
  • [29] High Throughput FPGA Architecture for Corner Detection in Traffic Images
    Dinh, Tung H.
    Vu, Dao Q.
    Vu-Duc Ngo
    Nam Pham Ngoc
    Truong, Vu T.
    2014 IEEE FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2014, : 297 - 302
  • [30] Intelligent Offloading Strategies For High Throughput Traffic Intersection Coordination
    Mo, Yangan
    Wang, Mengqi
    Zhang, Tingting
    Zhang, Qinyu
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOP (WCNCW), 2019,