4.5 Article

A New Cell-Counting-Based Attack Against Tor

Journal

IEEE-ACM TRANSACTIONS ON NETWORKING
Volume 20, Issue 4, Pages 1245-1261

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2011.2178036

Keywords

Anonymity; cell counting; mix networks; signal; Tor

Funding

  1. National Key Basic Research Program of China (973 Program) [2010CB328104, 2011CB302800]
  2. National Science Foundation of China (NSFC) [60903162, 60903161, 61070158, 61070161, 61003257, 61070221, 61070222/F020802]
  3. US National Science Foundation (NSF) [CNS0916584, CNS1065136, CNS-1117175]
  4. CityU Applied RD (ARD) [9681001, 6351006, 9667052]
  5. CityU Strategic Research Grant [7008110]
  6. ShenZhen-HK Innovation Cycle Grant [ZYB200907080078A]
  7. China Specialized Research Fund for the Doctoral Program of Higher Education [200802860031]
  8. Jiangsu Provincial Natural Science Foundation of China [BK2008030]
  9. Jiangsu Provincial Key Laboratory of Network and Information Security [BM2003201]
  10. Key Laboratory of Computer Network and Information Integration of Ministry of Education of China [93K-9]
  11. Division Of Computer and Network Systems
  12. Direct For Computer & Info Scie & Enginr [0958477] Funding Source: National Science Foundation
  13. Division Of Computer and Network Systems
  14. Direct For Computer & Info Scie & Enginr [1116644] Funding Source: National Science Foundation

Ask authors/readers for more resources

Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells (e. g., 512 B for Tor, a known real-world, circuit-based, low-latency anonymous communication network). Via extensive experiments on Tor, we found that the size of IP packets in the Tor network can be very dynamic because a cell is an application concept and the IP layer may repack cells. Based on this finding, we investigate a new cell-counting-based attack against Tor, which allows the attacker to confirm anonymous communication relationship among users very quickly. In this attack, by marginally varying the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a secret signal into the variation of cell counter of the target traffic. The embedded signal will be carried along with the target traffic and arrive at the malicious entry onion router. Then, an accomplice of the attacker at the malicious entry onion router will detect the embedded signal based on the received cells and confirm the communication relationship among users. We have implemented this attack against Tor, and our experimental data validate its feasibility and effectiveness. There are several unique features of this attack. First, this attack is highly efficient and can confirm very short communication sessions with only tens of cells. Second, this attack is effective, and its detection rate approaches 100% with a very low false positive rate. Third, it is possible to implement the attack in a way that appears to be very difficult for honest participants to detect (e. g., using our hopping-based signal embedding).

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available