DocumentCode :
2697370
Title :
Application-level attack against Tor´s hidden service
Author :
Zhang, Lu ; Luo, Junzhou ; Yang, Ming ; He, Gaofeng
Author_Institution :
Sch. of Comput. Sci. & Eng., Southeast Univ., Nanjing, China
fYear :
2011
fDate :
26-28 Oct. 2011
Firstpage :
509
Lastpage :
516
Abstract :
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Hidden service provided by Tor allows users to run a TCP server under a pseudonym, and its resources can be accessed without the operator´s real identity being revealed. In this paper, we propose a novel HTTP based application-level attack against Tor´s hidden web service. Under the assumption that the entry of the suspected hidden server´s circuit is occupied, we evaluate the time correlation between the web accessing and the generated traffic in the malicious onion router. Furthermore, we analyze the probability that the malicious onion routers occupy the entry of the hidden server´s circuit when advertise high bandwidth, which is the foundation of our attack. We conducted real-world experiments to evaluate our attack method. The empirical results demonstrate that the hidden service can be effectively and efficiently located.
Keywords :
Web services; computer network security; overlay networks; transport protocols; HTTP based application level attack; TCP server; TCP traffic anonymization; Tor hidden Web service; application level attack; malicious onion routers; overlay networks; pseudonym; Decision support systems; Educational institutions;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Applications (ICPCA), 2011 6th International Conference on
Conference_Location :
Port Elizabeth
Print_ISBN :
978-1-4577-0209-9
Type :
conf
DOI :
10.1109/ICPCA.2011.6106555
Filename :
6106555
Link To Document :
بازگشت