4.5 Article

An Anonymity Vulnerability in Tor

期刊

IEEE-ACM TRANSACTIONS ON NETWORKING
卷 30, 期 6, 页码 2574-2587

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2022.3174003

关键词

Relays; Internet; Monitoring; Security; Routing; Privacy; Correlation; Tor; traffic analysis; deanonymization; denial-of-service attacks

资金

  1. National Natural Science Foundation of China [61972105, U20B2046]
  2. Higher Education Innovation Group [2020KCXTD007]
  3. Guangzhou Higher Education Innovation Group [202032854]
  4. Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme in 2019

向作者/读者索取更多资源

This paper presents a new type of attack for deanonymizing user activities in Tor network, which can be used by both AS-level adversaries and Node-level adversaries. By exploiting the occasional failures of censored network and the poor reliability of Tor communication, the adversaries can gain control of the routes and reveal user activity information. The proposed attacks are shown to be effective and scalable in real-world Tor networks through experiments and evaluations.
Privacy is currently one of the most concerned issues in Cyberspace. Tor is the most widely used system in the world for anonymously accessing Internet. However, Tor is known to be vulnerable to end-to-end traffic correlation attacks when an adversary is able to monitor traffic at both communication endpoints. In this paper, we present a set of novel Trapper Attacks that can be used to deanonymize user activities by both AS-level adversaries and Node-level adversaries in a Tor network. First, AS-level adversaries can exploit the occasional failures of censored network to selectively control entry guards of the Tor users. Second, the adversaries can exploit poor reliability of the Tor communication (e.g., natural churn) to compromise the exiting nodes and the anonymous path. Once the adversaries gain control of the routes, they can identify and inspect any traffic entering and leaving the Tor network, consequently, deanonymize a Tor user's activity in the network. To demonstrate the effectiveness and feasibility of this attacks, we implemented a tool that can launch the proposed Trapper Attacks to automatic reveal communication relationships between a Tor user and its destinations running on a live Tor network. We also present a formal analysis framework to evaluate the integrity of the Tor network. With this framework, we successfully obtained quantitative estimates of Tor's security vulnerability. The proposed Trapper Attacks are also designed to scale up in real-world Tor networks. Namely, it allows an adversary to perform deanonymization in honey relays effectively, and compromise the anonymity of Tor clients in real time. Our experimental results show that the proposed attacks succeed in less than 40 seconds achieving a 100% accuracy rate and a false positive rate close to 0.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据