DocumentCode :
1806655
Title :
Locating hidden servers
Author :
Overlier, Lasse ; Syverson, Paul
Author_Institution :
Norwegian Defence Res. Establ.
fYear :
2006
fDate :
21-24 May 2006
Lastpage :
114
Abstract :
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship. We present fast and cheap attacks that reveal the location of a hidden server. Using a single hostile Tor node we have located deployed hidden servers in a matter of minutes. Although we examine hidden services over Tor, our results apply to any client using a variety of anonymity networks. In fact, these are the first actual intersection attacks on any deployed public network: thus confirming general expectations from prior theory and simulation. We recommend changes to route selection design and implementation for Tor. These changes require no operational increase in network overhead and are simple to make; but they prevent the attacks we have demonstrated. They have been implemented
Keywords :
computer networks; telecommunication security; Tor anonymous communication network; anonymity networks; censorship resistance; distributed DoS server resistance; hidden servers; intersection attacks; network overhead; single hostile Tor node; Communication networks; Computer crime; Educational institutions; Laboratories; Law; Network servers; Protection; Resists; Safety; Writing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 2006 IEEE Symposium on
Conference_Location :
Berkeley/Oakland, CA
ISSN :
1081-6011
Print_ISBN :
0-7695-2574-1
Type :
conf
DOI :
10.1109/SP.2006.24
Filename :
1624004
Link To Document :
بازگشت