Design Improvement for Tor Against Low-Cost Traffic Attack and Low-Resource Routing Attack

被引:10
|
作者
Xin, Liu [1 ,2 ]
Neng, Wang [1 ]
机构
[1] E China Normal Univ, Dept Comp Sci & Technol, Shanghai 200062, Peoples R China
[2] Shanghai Stock Commun Co Ltd, Shanghai 200131, Peoples R China
关键词
D O I
10.1109/CMC.2009.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tor is the second generation Onion Router, supporting the anonymous transport of TCP streams over the Inlet-net. Its low latency makes it very suitable for common Internet communication applications. So for has become the most successful public anonymity communication service in the Internet. In this paper, we investigate Tor design weaknesses. An adversary can use these weaknesses to attack Tor network such as low-cost traffic attack, low-resource routing attack and so on. Based on the investigation we propose tuning mechanisms to overcome the above-mentioned problems. The tuning mechanisms, include establishing evaluation system and optimizing Tor node, store and output mode. In addition we also present a theoretical analysis to the tuning mechanisms in terms of anonymity and performance. Through our theoretical analysis, we think with our tuning mechanisms, we can promote Tor network anonymity dramatically, and promote Tor network overall performance to the extent.
引用
收藏
页码:549 / +
页数:2
相关论文
共 50 条
  • [1] Low-Resource Routing Attacks Against Tor
    Bauer, Kevin
    McCoy, Damon
    Grunwald, Dirk
    Kohno, Tadayoshi
    Sicker, Douglas
    WPES'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON PRIVACY IN ELECTRONIC SOCIETY, 2007, : 11 - 20
  • [2] Low-cost traffic analysis of Tor
    Murdoch, SJ
    Danezis, G
    2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 183 - 195
  • [3] Low-cost Fortification of Arbiter PUF Against Modeling Attack
    Zalivaka, Siarhei S.
    Ivaniuk, Alexander A.
    Chang, Chip-Hong
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017,
  • [4] A Low-cost Attack on a Microsoft CAPTCHA
    Yan, Jeff
    El Ahmad, Ahmad Salah
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 543 - 554
  • [5] A Low-Cost Fault Injection Attack Resilient FSM Design
    Wang, Ziming
    Cui, Aijiao
    Qu, Gang
    2020 IEEE 33RD INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2020, : 19 - 24
  • [6] Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks
    Kadloor, Sachin
    Gong, Xun
    Kiyavash, Negar
    Tezcan, Tolga
    Borisov, Nikita
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [7] Improvement of temperature surveillance of neonates in low-resource settings by a simple low-cost device: a descriptive study
    Garvs, Janneke
    Genzel-Boroviczeny, Orsolya
    Phiri, Ajib
    Schultz, Andreas
    BMJ PAEDIATRICS OPEN, 2024, 8 (01)
  • [8] Low-cost and rapid sensors for wastewater surveillance at low-resource settings
    Zhugen Yang
    Nature Water, 2023, 1 (5): : 405 - 407
  • [9] Low-Cost Accurate Angle-of-Attack System
    Martos, Borja
    Rogers, David F.
    JOURNAL OF AIRCRAFT, 2018, 55 (02): : 660 - 665
  • [10] Examining Low-Cost Virtual Reality for Learning in Low-Resource Environments
    Vishwanath, Aditya
    Kam, Matthew
    Kumar, Neha
    DIS'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON DESIGNING INTERACTIVE SYSTEMS, 2017, : 1277 - 1281