Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23322
|View full text |Cite
|
Sign up to set email alerts
|

Measuring and Mitigating AS-level Adversaries Against Tor

Abstract: The popularity of Tor as an anonymity system has made it a popular target for a variety of attacks. We focus on traffic correlation attacks, which are no longer solely in the realm of academic research with recent revelations about the NSA and GCHQ actively working to implement them in practice.Our first contribution is an empirical study that allows us to gain a high fidelity snapshot of the threat of traffic correlation attacks in the wild. We find that up to 40% of all circuits created by Tor are vulnerable… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(44 citation statements)
references
References 25 publications
0
44
0
Order By: Relevance
“…For instance, Starov et al [70] recently show that approximately 40% of Tor circuits are vulnerable to ow correlation attacks by a single malicious AS, and Sun et al [72] show that churn in BGP as well as active manipulation of BGP updates can amplify an adversarial AS's visibility on Tor connections. This has lead to various proposals on deploying AS-aware path selection mechanisms for Tor [2,20,54].…”
Section: Flow Correlation Attacks On Tormentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, Starov et al [70] recently show that approximately 40% of Tor circuits are vulnerable to ow correlation attacks by a single malicious AS, and Sun et al [72] show that churn in BGP as well as active manipulation of BGP updates can amplify an adversarial AS's visibility on Tor connections. This has lead to various proposals on deploying AS-aware path selection mechanisms for Tor [2,20,54].…”
Section: Flow Correlation Attacks On Tormentioning
confidence: 99%
“…While ow correlation is the core of a multitude of attacks on Tor [3,8,20,22,28,38,39,49,52,54,70,72,72,83], existing ow correlation algorithms are assumed to be ine ective in linking Tor connections reliably and at scale [37,55,66]. This is due to Tor's extremely noisy network that applies large perturbations on Tor ows, therefore rendering tra c features across associated ingress and egress Tor ows hard to get reliably correlated.…”
Section: This Paper's Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…By combining TorPS with AS path prediction, Johnson et al could answer questions such as the average time until a Tor user's circuit is deanonymized by an AS or IXP. Most recently in 2016, Nithyanand et al [36] used AS path prediction to evaluate the practical threat faced by users in the top 10 countries using Tor. In 2015, Juen et al [28] examined the accuracy of path prediction algorithms that prior work [25,16] used to estimate the threat of correlation attacks.…”
Section: D) Traffic Analysis and Correlation Attacksmentioning
confidence: 99%
“…The path of a circuit does not only depend on the choice of relays, but also on the routing conditions between the relays. Adversaries use routing attacks [9], [39] to manipulate such paths, forcing traffic through areas that are under adversarial control.…”
Section: B Amplifier: Routing Attacksmentioning
confidence: 99%