Traffic Analysis of High Throughput Traffic on Tor

被引:1
|
作者
Mani, G. [1 ]
Srinivas, P. V. V. S. [2 ]
Rao, Ganga Rama Koteswara [2 ]
Prasad, Chitturi [3 ]
Priyanka, Donepudi [4 ]
Cherukuri, Naresh [5 ]
机构
[1] Vignans Inst Informat Technol Autonomous, Dept Informat Technol, Visakhapatnam 5300460, Andhra Pradesh, India
[2] Koneru Lakshmaiah Educ Fdn, Dept CSIT, Vaddeswaram 522502, AP, India
[3] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram 522502, AP, India
[4] Gudlavalleru Engn Coll, Dept CSE, Gudlavalleru 521356, AP, India
[5] Bapatla Engn Coll, Dept CSE, Bapatla 522502, AP, India
关键词
round trip time (RTT); attacks; Tor privacy; attackers; susceptible;
D O I
10.1109/I-SMAC52330.2021.9640934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tor is a popular anonymity network used by millions to access intemet services while maintaining their privacy. The main concept behind Tor is that a user can build a "circuit" of routers called relays, where each relay carries the client's traffic to the next relay, without any single relay knowing the full extent of the path. Thus, anonymity is achieved, because no single relay can trace the client to the destination. However, a paper written in 2005 titled "Low-Cost Traffic Analysis of Tor" by Steven J. Murdoch and George Danez is demonstrated that a traffic analysis attack was possible against the Tor network. Any attacker could monitor the load on a relay in the Tor network calculating the round trip time (RTT) to the relay, and when the RTT spiked, it was clear that the relay was being used. With this information, attackers could trace the path of a client in the Tor network and de-anonymize them. This paper was written in 2005, when Tor was stillyoung. At the time of Murdoch and Danezis' paper, the entire Tor network consisted of just fifty relays. As of the time of writing, there were well over 7,000 relays in the network, so the ecosystem of Tor is radically different. With all of the increased traffic, it is highly required to determine if this type of attack was still valid, and would not bemasked by other traffic. Our results indicate that if a victim is downloading or streaming a large file as fast as Tor will allow them to, a decrease in bandwidth and an increase in round trip time (RTT) is usually observable on each relay in the circuit. This research work has also discovered the Tor guard relays, a special subset of relays that clients will pick as the first hop in their circuit are very susceptible to this kind of attack.
引用
收藏
页码:844 / 849
页数:6
相关论文
共 50 条
  • [31] High Throughput Dynamic Vehicle Coordination for Intersection Ground Traffic
    Wang, Mengqi
    Zhang, Tingting
    Gao, Lin
    Zhang, Qinyu
    2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2018,
  • [32] In search of light: detecting cybercrime through the analysis of unencrypted traffic on the TOR network
    Gallo-Serpillo, Facundo
    Saldana-Taboada, Patricia
    INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2025,
  • [33] An Empirical Analysis of Plugin-Based Tor Traffic over SSH Tunnel
    Guan, Zhong
    Gou, Gaopeng
    Guan, Yangyang
    Wang, Bingxu
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [34] Improving Tor Security against Timing and Traffic Analysis Attacks with Fair Randomization
    Tavakoly, Asghar
    Atani, Reza Ebrahimi
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (01): : 67 - 76
  • [35] Throughput Analysis of Different Traffic Distribution in Cognitive Radio Network
    Bharathi, P. Shyamala
    Raj, K. Karthick
    Singh, Hiran Kumar
    Kumar, Dhananjay
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [36] Tor anonymous traffic identification based on gravitational clustering
    Rao, Zhihong
    Niu, Weina
    Zhang, XiaoSong
    Li, Hongwei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) : 592 - 601
  • [37] Characterization of Tor Traffic using Time based Features
    Lashkari, Arash Habibi
    Gil, Gerard Draper
    Mamun, Mohammad Saiful Islam
    Ghorbani, Ali A.
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 253 - 262
  • [38] Obfuscated Tor Traffic Identification Based on Sliding Window
    Xu, Wenliang
    Zou, Futai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [39] Tor Traffic Classification Based on Encrypted Payload Characteristics
    Choorod, Pitpimon
    Weir, George
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1107 - +
  • [40] Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor
    Kong, Xiangdong
    Shen, Meng
    Che, Zheng
    Yu, Congcong
    Zhu, Liehuang
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2022, 2022, 1679 : 292 - 305