Design Improvement for Tor Against Low-Cost Traffic Attack and Low-Resource Routing Attack

被引:10
|
作者
Xin, Liu [1 ,2 ]
Neng, Wang [1 ]
机构
[1] E China Normal Univ, Dept Comp Sci & Technol, Shanghai 200062, Peoples R China
[2] Shanghai Stock Commun Co Ltd, Shanghai 200131, Peoples R China
关键词
D O I
10.1109/CMC.2009.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tor is the second generation Onion Router, supporting the anonymous transport of TCP streams over the Inlet-net. Its low latency makes it very suitable for common Internet communication applications. So for has become the most successful public anonymity communication service in the Internet. In this paper, we investigate Tor design weaknesses. An adversary can use these weaknesses to attack Tor network such as low-cost traffic attack, low-resource routing attack and so on. Based on the investigation we propose tuning mechanisms to overcome the above-mentioned problems. The tuning mechanisms, include establishing evaluation system and optimizing Tor node, store and output mode. In addition we also present a theoretical analysis to the tuning mechanisms in terms of anonymity and performance. Through our theoretical analysis, we think with our tuning mechanisms, we can promote Tor network anonymity dramatically, and promote Tor network overall performance to the extent.
引用
收藏
页码:549 / +
页数:2
相关论文
共 50 条
  • [21] On Traffic Characteristics and Low-cost Router Design
    Zhang Xiaohui
    Chen Shuqiao
    Lv Ping
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 268 - 272
  • [22] Tor low-cost energy harvesting
    Vlemencq, Louis
    Electronic Design, 2009, 57 (20) : 48 - 50
  • [23] An Active De-anonymizing Attack Against Tor Web Traffic
    Ming Yang
    Xiaodan Gu
    Zhen Ling
    Changxin Yin
    Junzhou Luo
    Tsinghua Science and Technology, 2017, 22 (06) : 702 - 713
  • [24] An Active De-anonymizing Attack Against Tor Web Traffic
    Yang, Ming
    Gu, Xiaodan
    Ling, Zhen
    Yin, Changxin
    Luo, Junzhou
    TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 22 (06) : 702 - 713
  • [25] A Low-Cost Masquerade and Replay Attack Detection Method for CAN in Automobiles
    Ansari, Mohammad Raashid
    Miller, W. Thomas
    She, Chenghua
    Yu, Qiaoyan
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, : 2178 - 2181
  • [26] A Highly Interpretable Framework for Generic Low-Cost UAV Attack Detection
    Wu, Shihao
    Li, Yang
    Wang, Zhaoxuan
    Tan, Zheng
    Pan, Quan
    IEEE SENSORS JOURNAL, 2023, 23 (07) : 7288 - 7300
  • [27] A low-cost attack on branch-based software watermarking schemes
    Gupta, Gaurav
    Pieprzyk, Josef
    DIGITAL WATERMARKING, PROCEEDINGS, 2006, 4283 : 282 - 293
  • [28] A low-cost node capture attack algorithm for wireless sensor networks
    Lin, Chi
    Wu, Guowei
    Qiu, Tie
    Deng, Jing
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (07) : 1251 - 1268
  • [29] Comparing low-cost handheld autorefractors: A practical approach to measuring refraction in low-resource settings
    Agarwal, Arunika
    Bloom, David E.
    deLuise, Vincent P.
    Lubet, Alyssa
    Murali, Kaushik
    Sastry, Srinivas M.
    PLOS ONE, 2019, 14 (10):
  • [30] A Hand-Powered, Portable, Low-Cost Centrifuge for Diagnosing Anemia in Low-Resource Settings
    Brown, Jocelyn
    Theis, Lauren
    Kerr, Lila
    Zakhidova, Nazima
    O'Connor, Kelly
    Uthman, Margaret
    Oden, Z. Maria
    Richards-Kortum, Rebecca
    AMERICAN JOURNAL OF TROPICAL MEDICINE AND HYGIENE, 2011, 85 (02): : 327 - 332