Traffic Analysis of High Throughput Traffic on Tor

被引:1
|
作者
Mani, G. [1 ]
Srinivas, P. V. V. S. [2 ]
Rao, Ganga Rama Koteswara [2 ]
Prasad, Chitturi [3 ]
Priyanka, Donepudi [4 ]
Cherukuri, Naresh [5 ]
机构
[1] Vignans Inst Informat Technol Autonomous, Dept Informat Technol, Visakhapatnam 5300460, Andhra Pradesh, India
[2] Koneru Lakshmaiah Educ Fdn, Dept CSIT, Vaddeswaram 522502, AP, India
[3] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram 522502, AP, India
[4] Gudlavalleru Engn Coll, Dept CSE, Gudlavalleru 521356, AP, India
[5] Bapatla Engn Coll, Dept CSE, Bapatla 522502, AP, India
来源
PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021) | 2021年
关键词
round trip time (RTT); attacks; Tor privacy; attackers; susceptible;
D O I
10.1109/I-SMAC52330.2021.9640934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tor is a popular anonymity network used by millions to access intemet services while maintaining their privacy. The main concept behind Tor is that a user can build a "circuit" of routers called relays, where each relay carries the client's traffic to the next relay, without any single relay knowing the full extent of the path. Thus, anonymity is achieved, because no single relay can trace the client to the destination. However, a paper written in 2005 titled "Low-Cost Traffic Analysis of Tor" by Steven J. Murdoch and George Danez is demonstrated that a traffic analysis attack was possible against the Tor network. Any attacker could monitor the load on a relay in the Tor network calculating the round trip time (RTT) to the relay, and when the RTT spiked, it was clear that the relay was being used. With this information, attackers could trace the path of a client in the Tor network and de-anonymize them. This paper was written in 2005, when Tor was stillyoung. At the time of Murdoch and Danezis' paper, the entire Tor network consisted of just fifty relays. As of the time of writing, there were well over 7,000 relays in the network, so the ecosystem of Tor is radically different. With all of the increased traffic, it is highly required to determine if this type of attack was still valid, and would not bemasked by other traffic. Our results indicate that if a victim is downloading or streaming a large file as fast as Tor will allow them to, a decrease in bandwidth and an increase in round trip time (RTT) is usually observable on each relay in the circuit. This research work has also discovered the Tor guard relays, a special subset of relays that clients will pick as the first hop in their circuit are very susceptible to this kind of attack.
引用
收藏
页码:844 / 849
页数:6
相关论文
共 50 条
  • [41] Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor
    Kong, Xiangdong
    Shen, Meng
    Che, Zheng
    Yu, Congcong
    Zhu, Liehuang
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2022, 2022, 1679 : 292 - 305
  • [42] Improving the Tor Traffic Distribution with Circuit Switching Method
    Kale, Timothy Girry
    Ohzahata, Satoshi
    Wu, Celimuge
    Kato, Toshihiko
    2016 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 2016, : 106 - 107
  • [43] The high frequency traffic flow analysis
    Zhang Gaoyu
    Zhou Zhizhao
    Zhou Huan
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 221 - +
  • [44] Performance Analysis of Guaranteed Throughput and Best Effort Traffic in Network-on-Chip under Different Traffic Scenario
    Paliwal, Krishan Kumar
    Gaur, M. S.
    Laxmi, Vijai
    Janyani, Vijay
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 74 - +
  • [45] High-level traffic-violation detection for embedded traffic analysis
    Vijverberg, Julien A.
    de Koning, Nick A. H. M.
    Han, Jungong
    de With, Peter H. N.
    Cornelissen, Dion
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 793 - +
  • [46] AIR-TRAFFIC MANAGEMENT - HIGH-LOW TRAFFIC INTENSITY ANALYSIS
    VELAZCO, EE
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 1995, 80 (01) : 45 - 58
  • [47] A quantitative study on traffic network throughput
    Liu, YT
    Özguner, Ü
    2003 IEEE INTELLIGENT TRANSPORTATION SYSTEMS PROCEEDINGS, VOLS. 1 & 2, 2003, : 108 - 113
  • [48] Evaluation of Throughput Performance of Traffic Shapers
    Minhas, Tahir Nawaz
    Fiedler, Markus
    Shaikh, Junaid
    Arlos, Patrik
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 1596 - 1600
  • [49] High-throughput Traffic Classification on Multi-core Processors
    Tong, Da
    Qu, Yun R.
    Prasanna, Viktor K.
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 2014, : 138 - 145
  • [50] THE EFFECT OF HIGH-LEVEL ACKNOWLEDGMENT TRAFFIC ON THE THROUGHPUT OF ALOHA CHANNELS
    BORGONOVO, F
    FRATTA, L
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1984, 32 (05) : 640 - 642