scholarly journals Privacy Preserving Detection of Path Bias Attacks in Tor

2020 ◽  
Vol 2020 (4) ◽  
pp. 111-130
Author(s):  
Lauren Watson ◽  
Anupam Mediratta ◽  
Tariq Elahi ◽  
Rik Sarkar

AbstractAnonymous communication networks like Tor are vulnerable to attackers that control entry and exit nodes. Such attackers can compromise the essential anonymity and privacy properties of the network. In this paper, we consider the path bias attack– where the attacker induces a client to use compromised nodes and thus links the client to their destination. We describe an efficient scheme that detects such attacks in Tor by collecting routing telemetry data from nodes in the network. The data collection is differentially private and thus does not reveal behaviour of individual users even to nodes within the network. We show provable bounds for the sample complexity of the scheme and describe methods to make it resilient to introduction of false data by the attacker to subvert the detection process. Simulations based on real configurations of the Tor network show that the method works accurately in practice.

2021 ◽  
pp. 103582
Author(s):  
Jingcheng Song ◽  
Zhaoyang Han ◽  
Weizheng Wang ◽  
Jingxue Chen ◽  
Yining Liu

2019 ◽  
Vol 148 ◽  
pp. 340-348 ◽  
Author(s):  
Yi-Ning Liu ◽  
Yan-Ping Wang ◽  
Xiao-Fen Wang ◽  
Zhe Xia ◽  
Jing-Fang Xu

2019 ◽  
Vol 6 (6) ◽  
pp. 10363-10374 ◽  
Author(s):  
Ahmad Alsharif ◽  
Mahmoud Nabil ◽  
Ahmed Sherif ◽  
Mohamed Mahmoud ◽  
Min Song

2020 ◽  
Vol 5 (4) ◽  
pp. 526-540 ◽  
Author(s):  
Siguang Chen ◽  
Xi Zhu ◽  
Haijun Zhang ◽  
Chuanxin Zhao ◽  
Geng Yang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document