tor network
Recently Published Documents


TOTAL DOCUMENTS

95
(FIVE YEARS 40)

H-INDEX

12
(FIVE YEARS 3)

2021 ◽  
Vol 2022 (1) ◽  
pp. 522-543
Author(s):  
Lennart Oldenburg ◽  
Gunes Acar ◽  
Claudia Diaz

Abstract We present a novel web-based attack that identifies a Tor user’s guard in a matter of seconds. Our attack is low-cost, fast, and stealthy. It requires only a moderate amount of resources and can be deployed by website owners, third-party script providers, and malicious exits—if the website traffic is unencrypted. The attack works by injecting resources from non-existing onion service addresses into a webpage. Upon visiting the attack webpage with Tor Browser, the victim’s Tor client creates many circuits to look up the non-existing addresses. This allows middle relays controlled by the adversary to detect the distinctive traffic pattern of the “404 Not Found” lookups and identify the victim’s guard. We evaluate our attack with extensive simulations and live Tor network measurements, taking a range of victim machine, network, and geolocation configurations into account. We find that an adversary running a small number of HSDirs and providing 5 % of Tor’s relay bandwidth needs 12.06 seconds to identify the guards of 50 % of the victims, while it takes 22.01 seconds to discover 90 % of the victims’ guards. Finally, we evaluate a set of countermeasures against our attack including a defense that we develop based on a token bucket and the recently proposed Vanguards-lite defense in Tor.


2021 ◽  
Vol 21 (3) ◽  
pp. 31-38
Author(s):  
Hyeong Seok Lim ◽  
◽  
Soo Jin Lee
Keyword(s):  

Author(s):  
Florian Platzer ◽  
Marcel Schäfer ◽  
Martin Steinebach

Tor is a widely-used anonymity network with more than two million daily users. A prominent feature of Tor is the hidden service architecture. Hidden services are a popular method for communicating anonymously or sharing web contents anonymously. For security reasons, in Tor all data packets to be send over the network are structured completely identical. They are encrypted using the TLS protocol and its size is fixed to exactly 512 bytes. In this work we describe a method to deanonymize any hidden service on Tor based on traffic analysis. This method allows an attacker with modest resources to deanonymize any hidden services in less than 12.5 days. This poses a threat to anonymity online.


Author(s):  
Sergio Mauricio Martinez Monterrubio ◽  
Joseph Eduardo Armas Naranjo ◽  
Lorena Isabel Barona Lopez ◽  
Angel Leonardo Valdivieso Caraguay
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document