2020
DOI: 10.1007/978-3-030-58201-2_15
|View full text |Cite
|
Sign up to set email alerts
|

Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor

Abstract: Tor is the most popular anonymization system with millions of daily users and, thus, an attractive target for attacks, e.g., by malicious autonomous systems (ASs) performing active routing attacks to become man in the middle and deanonymize users. It was shown that the number of such malicious ASs is significantly larger than previously expected due to the lack of security guarantees in the Border Gateway Protocol (BGP). In response, recent works suggest alternative Tor path selection methods prefering Tor nod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Security is another important consideration-incremental deployment inherently creates differences between Tor clients or relays that have adopted a modification and those who have not. This has been an issue for client side proposals as anonymity in Tor relies on all clients behaving uniformly [12,14,36,60,61,74,85].…”
Section: Integration With Tormentioning
confidence: 99%
See 2 more Smart Citations
“…Security is another important consideration-incremental deployment inherently creates differences between Tor clients or relays that have adopted a modification and those who have not. This has been an issue for client side proposals as anonymity in Tor relies on all clients behaving uniformly [12,14,36,60,61,74,85].…”
Section: Integration With Tormentioning
confidence: 99%
“…There is additionally a large body of work that alters path selection in Tor for purposes of security [13,15,30,40,48,64,73,82,89]. While important, these works are orthogonal to ShorTor and often result in substantially degraded performance [61,74] without clear security advantages over Tor's current protocol [36,85,86].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The Tor experimentation tools and models described above have assisted researchers in exploring how changes to Tor's path selection [5,7,13,24,28,41,46,52,58,60,61,73,75], load balancing [22,27,31,34,40,53], traffic admission control [2,16,21,23,33,35,37,42,47,74], congestion control [4,20], and denial of service mechanisms [12,26,36,39,59] affect Tor performance and security [3]. The standard practice that has emerged from this work is to sample a single scaled-down Tor network model and use it to run experiments with standard Tor and each of a set of chosen configurations of the proposed performance-enhancing mechanism.…”
Section: Tor Performance Studiesmentioning
confidence: 99%
“…Researchers have contributed numerous proposals for improving Tor performance in order to support continued growth in the network, including those that attempt to improve Tor's path selection [5,7,13,24,28,41,46,52,58,60,61,73,75], load balancing [22,27,31,34,40,53], traffic admission control [2,16,21,23,33,35,37,42,47,74], and congestion control mechanisms [4,20]. The standard practice when proposing a new mechanism for Tor is to run a single experiment with each recommended configuration of the mechanism and a single experiment with standard Tor.…”
Section: Introductionmentioning
confidence: 99%