• DocumentCode
    644395
  • Title

    IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor Network

  • Author

    Peipeng Liu ; Jinqiao Shi ; Lihong Wang ; Xiao Wang ; Qingfeng Tan

  • Author_Institution
    Inst. of Comput. Technol., Beijing, China
  • fYear
    2013
  • fDate
    17-19 July 2013
  • Firstpage
    166
  • Lastpage
    172
  • Abstract
    Tor is a worldwide publicly deployed low-latency anonymity system. In order to prevent observers from telling where the data came from and where it´s going, data packets on the Tor network take a pathway through several intermediate relays. However, nodes selection to build such a pathway is oblivious to Internet routing, so anonymity guarantees can break down in cases where an attacker can correlate traffic across the entry- and exit-segments of a Tor circuit. Although many works have been done to avoid this kind of collusion attack, recent researches [18] indicated that some Internet exchanges (IXes) locating at the entry- and exit-transmission paths in Tor network (that are the paths from the client to the chosen entry node and from the chosen exit node to the destination) are still possible to perform a correlation attack. However, few works have been done to suggest and verify modifications to Tor´s path selection algorithm that would help clients avoid an IX-level observer. In this paper, we first, based on the entry-exit pairs chosen by Tor´s path selection algorithm, demonstrated that the probability of a single IX observing both ends of an anonymous Tor connection is greater than previously thought. And then, we proposed and evaluated the effectiveness of a simple IX-awareness path selection algorithm that help to resist IX-level attackers.
  • Keywords
    Internet; computer crime; probability; telecommunication network routing; telecommunication security; telecommunication traffic; IX-awareness path selection algorithm; IX-level adversaries; IX-level attackers; IX-level observer; IXes; Internet exchanges; Internet routing; Tor circuit; Tor network; Tor path selection algorithm; anonymity guarantees; collusion attack; correlation attack; data packets; entry node; entry-transmission paths; exit node; exit-transmission paths; intermediate relays; low-latency anonymity system; nodes selection; probability; traffic; Algorithm design and analysis; IP networks; Internet; Observers; Relays; Routing; Security; Anonymity; IX; Path Selection; Tor;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networking, Architecture and Storage (NAS), 2013 IEEE Eighth International Conference on
  • Conference_Location
    Xi´an
  • Type

    conf

  • DOI
    10.1109/NAS.2013.27
  • Filename
    6665359