2016 IEEE Conference on Communications and Network Security (CNS) 2016
DOI: 10.1109/cns.2016.7860478
|View full text |Cite
|
Sign up to set email alerts
|

Honey Onions: A framework for characterizing and identifying misbehaving Tor HSDirs

Abstract: Abstract-In the last decade, Tor proved to be a very successful and widely popular system to protect users' anonymity. However, Tor remains a practical system with a variety of limitations, some of which were indeed exploited in the recent past. In particular, Tor's security relies on the fact that a substantial number of its nodes do not misbehave. In this work we introduce, the concept of honey onions, a framework to detect misbehaving Tor relays with HSDir capability. This allows to obtain lower bounds on m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…Security [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [21], [58], [59], [60], [61], [62], [63], [64], [19] 28…”
Section: Research Fieldmentioning
confidence: 99%
“…Security [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [21], [58], [59], [60], [61], [62], [63], [64], [19] 28…”
Section: Research Fieldmentioning
confidence: 99%
“…Another interesting direction is the creation of "honey onions" (honeypots + onion services) [62] to identify malicious directories. These Honions, as they are called in the literature, are HS whose links (.onion) are not public anywhere, which means that only the service administrators knows= about then.…”
Section: Prevention Against Attacksmentioning
confidence: 99%
“…Furthermore, we assume that the adversary controls some number of servers. To give an intuition for a possible parameter, studies on Tor suggest that less than 20% of the servers are malicious [21,25,31]. For most of this paper, we assume that each Yodel server has a 20% chance of being controlled by the adversary; however, this is just a parameter for Yodel, which influences the number of hops that messages must traverse.…”
Section: Goals and Threat Modelmentioning
confidence: 99%