Abstract | ||
---|---|---|
Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications over the Internet. In this paper, we present an extensive study of protocol-level attacks against Tor. Different from existing attacks, the attacks investigated in this paper can confirm anonymous communication relationships quickly and accurately by manipulating one single cell and pose a serious threat against Tor. In these attacks, a malicious entry onion router may duplicate, modify, insert, or delete cells of a TCP stream from a sender, which can cause cell recognition errors at the exit onion router. If an accomplice of the attacker at the entry onion router also controls the exit onion router and recognizes such cell recognition errors, the communication relationship between the sender and receiver will be confirmed. These attacks can also be used for launching the denial-of-service (DoS) attack to disrupt the operation of Tor. We systematically analyze the impact of these attacks and our data indicate that these attacks may drastically degrade the anonymity service that Tor provides, if the attacker is able to control a small number of Tor routers. We have implemented these attacks on Tor and our experiments validate their feasibility and effectiveness. We also present guidelines for defending against protocol-level attacks. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1016/j.comnet.2012.11.005 | Computer Networks |
Keywords | DocType | Volume |
Protocol-level attacks,Anonymity,Mix networks,Tor | Journal | 57 |
Issue | ISSN | Citations |
4 | 1389-1286 | 8 |
PageRank | References | Authors |
0.48 | 25 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zhen Ling | 1 | 209 | 25.15 |
Junzhou Luo | 2 | 1257 | 153.97 |
Wei Yu | 3 | 1338 | 118.61 |
Xinwen Fu | 4 | 1054 | 86.64 |
Weijia Jia | 5 | 2656 | 221.35 |
Wei Zhao | 6 | 3532 | 404.01 |