Title
Attacking Tor through Unpopular Ports
Abstract
Anonymity systems try to conceal the relationship between the communicating entities in network communication. Popular systems, such as Tor and JAP, achieve anonymity by forwarding the traffic through a sequence of relays. In particular, Tor protocol constructs a circuit of typically 3 relays such as no single relay knows both the source and destination of the traffic. A known attack on Tor consists in injecting a set of compromised relays and wait until a Tor client picks two of them as entry (first) and exit (last) relays. With the currently large number of relays, this attack is not scalable anymore. In this paper, we take advantage of the presence of unpopular ports in Tor network to significantly increase the scalability of the attack: instead of injecting typical Tor relays (with the default exit policy), we inject only relays allowing unpopular ports. Since only a small fraction of Tor relays allow unpopular ports, the compromised relays will outnumber the valid ones. We show how Tor traffic can be redirected through unpopular ports. The experimental analysis shows that by injecting a relatively small number of compromised relays (30 pairs of relays) allowing a certain unpopular port, more than 50% of constructed circuits are compromised.
Year
DOI
Venue
2013
10.1109/ICDCSW.2013.29
ICDCS Workshops
Keywords
Field
DocType
known attack,tor traffic,unpopular port,attacking tor,tor network,certain unpopular port,tor client,default exit policy,unpopular ports,tor relay,anonymity system,typical tor relay,protocols,servers,internet,censorship,network security,data privacy,privacy,bandwidth,information security
Port (computer networking),Computer science,Computer security,Server,Network security,Computer network,Anonymity,Information privacy,Relay,The Internet,Scalability
Conference
ISSN
Citations 
PageRank 
1545-0678
2
0.36
References 
Authors
9
2
Name
Order
Citations
PageRank
Muhammad Aliyu Sulaiman1231.45
sami zhioua27213.00