A New Cell-Counting-Based Attack against Tor
#1

Abstract

      Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells (e.g., 512 B for Tor, a known real-world, circuit- based, low-latency anonymous communication network). Via extensive experiments on Tor, we found that the size of IP packets in the Tor network can be very dynamic because a cell is an application concept and the IP layer may repack cells. Based on this finding, we investigate a new cell-counting-based attack against Tor, which allows the attacker to confirm anonymous communication relationship among users very quickly. In this attack, by marginally varying the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a secret signal into the variation of cell counter of the target traffic. The embedded signal will be carried along with the target traffic and arrive at the malicious entry onion router. Then, an accomplice of the attacker at the malicious entry onion router will detect the embedded signal based on the received cells and confirm the communication relationship among users. We have implemented this attack against Tor, and our experimental data validate its feasibility and effectiveness. There are several unique features of this attack. First, this attack is highly efficient and can confirm very short communication sessions with only tens of cells. Second, this attack is effective, and its detection rate approaches 100% with a very low false positive rate. Third, it is possible to implement the attack in a way that appears to be very difficult for honest participants to detect (e.g., using our hopping-based signal embedding).
Reply
#2

Concerns about privacy and security have received increased attention with the rapid growth and public acceptance of the Internet, which has been used to create our global economy E. Anonymity has become a necessary and legitimate goal in many applications, Including anonymous browsing on the Web, location-based services (LBS), and electronic voting. In these applications, encryption alone can not maintain the anonymity required by participants. In the past, researchers have developed numerous anonymous communication systems. In general, mixing techniques can be used for message-based (high latency) or flow-based (low latency) anonymity applications. Email is a typical message-based anonymity application that has been thoroughly researched. Research on applications based on the anonymity flow has recently received great attention in order to preserve anonymity in low latency applications, including web browsing and peer-to-peer file sharing.

To degrade the anonymity service provided by anonymous communication systems, traffic analysis attacks have been studied. Existing traffic analysis attacks can be classified into two groups: passive traffic analysis and active watermarking techniques. The passive traffic analysis technique will log passively traffic and identify the similarity between the outgoing traffic of the sender and the incoming traffic of the receiver based on statistical measures. Because this type of attack is based on the correlation of the times of the messages that move through the anonymous system and does not change the characteristics of the traffic, it is also a passive synchronization attack. For example, Serjantov et al. He proposed a passive packet count scheme to observe the number of packets in a connection arriving at a merge node and leaving a node. However, they did not elaborate how packet counting could be done. To improve the accuracy of attacks, the active watermark technique has recently received a lot of attention. The idea of this technique is to actively introduce special signals (or tags) into the outgoing traffic of the sender with the intention of recognizing the signal embedded in the incoming traffic of the receiver.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: onion, tor disadvantages, tor anonymity network, tor project for safari, eleva tor using plc and scada, gsm based object counting robot, microcontroller based retail pharmaceutical tablets counting device,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 788 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 752 15-02-2017, 11:00 AM
Last Post: jaseela123d
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,906 18-03-2013, 12:25 PM
Last Post: computer topic
  DEFENDING SYN ATTACK IN TCP USING CRYPTOGRAPHY nit_cal 1 1,903 30-10-2012, 04:56 PM
Last Post: Guest
  1000 computer science projects ideas,topics or titles (New and Updated list) project topics 2 5,261 08-03-2012, 10:02 AM
Last Post: seminar paper
  CELL BREATHING TECHNIQUES FOR LOAD BALANCING IN WIRELESS LANS- MOBILE COMPUTING electronics seminars 5 5,240 01-03-2012, 02:58 PM
Last Post: seminar paper
  A New TCP For Persistent Packet Reordering mechanical engineering crazy 2 2,425 01-03-2012, 02:54 PM
Last Post: seminar paper
  MONITORING THE APPLICATION LAYER FOR DDOS ATTACK FOR POPULAR WEBSITE seminar surveyer 3 3,306 26-01-2012, 10:19 AM
Last Post: seminar addict
  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper Projects9 0 786 23-01-2012, 04:35 PM
Last Post: Projects9
  Dynamic Security Risk Management Using Bayesian Attack Graphs Projects9 1 1,576 23-01-2012, 11:40 AM
Last Post: seminar addict

Forum Jump: