DocumentCode :
651579
Title :
Attacking Tor through Unpopular Ports
Author :
Sulaiman, Muhammad Aliyu ; Zhioua, Sami
Author_Institution :
Inf. & Comput. Sci. Dept., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
fYear :
2013
fDate :
8-11 July 2013
Firstpage :
33
Lastpage :
38
Abstract :
Anonymity systems try to conceal the relationship between the communicating entities in network communication. Popular systems, such as Tor and JAP, achieve anonymity by forwarding the traffic through a sequence of relays. In particular, Tor protocol constructs a circuit of typically 3 relays such as no single relay knows both the source and destination of the traffic. A known attack on Tor consists in injecting a set of compromised relays and wait until a Tor client picks two of them as entry (first) and exit (last) relays. With the currently large number of relays, this attack is not scalable anymore. In this paper, we take advantage of the presence of unpopular ports in Tor network to significantly increase the scalability of the attack: instead of injecting typical Tor relays (with the default exit policy), we inject only relays allowing unpopular ports. Since only a small fraction of Tor relays allow unpopular ports, the compromised relays will outnumber the valid ones. We show how Tor traffic can be redirected through unpopular ports. The experimental analysis shows that by injecting a relatively small number of compromised relays (30 pairs of relays) allowing a certain unpopular port, more than 50% of constructed circuits are compromised.
Keywords :
Internet; data privacy; protocols; relay networks (telecommunication); telecommunication security; telecommunication traffic; Internet; JAP; Tor network; Tor protocol; Tor relays; Tor traffic; anonymity systems; attack scalability; communicating entities; compromised relays; entry relays; network communication; privacy; relays sequence; traffic destination; traffic source; unpopular ports; Bandwidth; Browsers; Peer-to-peer computing; Ports (Computers); Protocols; Relays; Servers; Anonymity Systems; Censorship; Information Security; Network Security; Privacy; Tor Network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE 33rd International Conference on
Conference_Location :
Philadelphia, PA
Print_ISBN :
978-1-4799-3247-4
Type :
conf
DOI :
10.1109/ICDCSW.2013.29
Filename :
6679859
Link To Document :
بازگشت