[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2508859.2516651acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Users get routed: traffic correlation on tor by realistic adversaries

Published: 04 November 2013 Publication History

Abstract

We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realistic adversaries in the Tor network or in the underlying Internet. Our results show that Tor users are far more susceptible to compromise than indicated by prior work. Specific contributions of the paper include(1)a model of various typical kinds of users,(2)an adversary model that includes Tor network relays, autonomous systems(ASes), Internet exchange points (IXPs), and groups of IXPs drawn from empirical study,(3) metrics that indicate how secure users are over a period of time,(4) the most accurate topological model to date of ASes and IXPs as they relate to Tor usage and network configuration,(5) a novel realistic Tor path simulator (TorPS), and(6)analyses of security making use of all the above. To show that our approach is useful to explore alternatives and not just Tor as currently deployed, we also analyze a published alternative path selection algorithm, Congestion-Aware Tor. We create an empirical model of Tor congestion, identify novel attack vectors, and show that it too is more vulnerable than previously indicated.

References

[1]
0x539 Dev Group. Gobby: A Collaborative Text Editor.http://gobby.0x539.de, 2013.
[2]
T. G. Abbott, K. J. Lai, M. R. Lieberman, and E. C. Price. Browser-Based Attacks on Tor. In Privacy Enhancing Technologies Symposium (PETS), 2007.
[3]
M. Akhoondi, C. Yu, and H. V. Madhyastha. LASTor: A Low-Latency AS-Aware Tor Client. In IEEE Symposium on Security and Privacy (Oakland), 2012.
[4]
B. Augustin, B. Krishnamurthy, and W. Willinger. IXPs: Mapped? In ACM SIGCOMM Conference on Internet Measurement (IMC), November 2009.
[5]
S. L. Blond, P. Manils, A. Chaabane, M. A. Kaafar, A. Legout, C. Castellucia, and W. Dabbous. De-anonymizing BitTorrent Users on Tor (poster). In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010.
[6]
N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity. In ACM Conference on Computer and Communications Security (CCS), 2007.
[7]
X. Cai, J. Heidemann, B. Krishnamurthy, and W. Willinger. Towards an AS-to-organization Map. In Internet Measurement Conference, 2010.
[8]
X. Cai, X. C. Zhang, B. Joshi, and R. Johnson. Touching from a Distance: Website Fingerprinting Attacks and Defenses. In ACM Conference on Computer and Communications Security (CCS), 2012.
[9]
CAIDA. IPv4 Routed /24 Topology Dataset. http://www.caida.org/data/active/ipv4_routed_24_topology_dataset.xml, December 2012.
[10]
CAIDA. The CAIDA AS Relationships Dataset. http://www.caida.org/data/active/ as-relationships/, June 2012.
[11]
D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84--90, 1981.
[12]
C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards Measuring Anonymity. In Privacy Enhancing Technologies (PET), 2003.
[13]
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In USENIX Security Symposium (USENIX), 2004.
[14]
P. Eckersley. How Unique is Your Browser? In Privacy Enhancing Technologies Symposium (PETS), 2010.
[15]
M. Edman and P. Syverson. AS-Awareness in Tor Path Selection. In ACM Conference on Computer and Communications Security (CCS), 2009.
[16]
T. Elahi, K. Bauer, M. AlSabah, R. Dingledine, and I. Goldberg. Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor. In ACM Workshop on Privacy in the Electronic Society (WPES), 2012.
[17]
Equinix. Equinix Internet Exchange Enables Efficient Interconnection between Hundreds of Networks. http://www.equinix.com/solutions/by-services/interconnection/exchanges/equinix-internet-exchange/.
[18]
N. S. Evans, R. Dingledine, and C. Grothoff. A Practical Congestion Attack on Tor using Long Paths. In USENIX Security Symposium (USENIX), 2009.
[19]
N. Feamster and R. Dingledine. Location Diversity in Anonymity Networks. In ACM Workshop on Privacy in the Electronic Society (WPES), 2004.
[20]
J. Feigenbaum, A. Johnson, and P. Syverson. Probabilistic Analysis of Onion Routing in a Black-box Model. ACM Transactions on Information and System Security (TISSEC), 15(3):14:1--14:28, 2012.
[21]
L. Gao. On Inferring Autonomous System Relationships in the Internet. In IEEE/ACM Transactions on Networking, volume 9, pages 733--745, December 2001.
[22]
S. Hahn and K. Loesing. Privacy-preserving Ways to Estimate the Number of Tor Users, November 2010. Available at https://metrics.torproject.org/papers/countingusers-2010--11--30.pdf.
[23]
A. Hamel, J.-C. Grégoire, and I. Goldberg. The Misentropists: New Approaches to Measures in Tor. Technical Report 2011--18, Cheriton School of Computer Science, University of Waterloo, 2011.
[24]
N. Hopper, E. Y. Vasserman, and E. Chan-Tin. How Much Anonymity Does Network Latency Leak? ACM Transactions on Information and System Security (TISSEC), 13(2):13, 2010.
[25]
R. Jansen and N. Hopper. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. In Network and Distributed System Security Symposium (NDSS), 2012.
[26]
R. Jansen, K. Bauer, N. Hopper, and R. Dingledine. Methodically modeling the tor network. In USENIX Workshop on Cyber Security Experimentation and Test (CSET), August 2012.
[27]
A. Johnson, P. Syverson, R. Dingledine, and N. Mathewson. Trust-based anonymous communication: Adversary models and routing algorithms. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), pages 175--186. ACM, 2011.
[28]
J. P. J. Juen. Protecting Anonymity in the Presence of Autonomous System and Internet Exchange Level Adversaries. Master's thesis, University of Illinois, 2012.
[29]
S. J. Murdoch and G. Danezis. Low-Cost Traffic Analysis of Tor. In IEEE Symposium on Security and Privacy (Oakland), 2005.
[30]
S. J. Murdoch and P. Zielinski. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In Privacy Enhancing Technologies (PET), 2007.
[31]
Office of Engineering and Technology and Consumer and Governmental Affairs Bureau. A Report on Consumer Wireline Broadband Performance in the U.S. Technical report, Federal Communications Commission, February 2013.
[32]
L. Øverlier and P. Syverson. Locating Hidden Servers. In IEEE Symposium on Security and Privacy (Oakland), 2006.
[33]
J. Qiu and L. Gao. AS Path Inference by Exploiting Known AS Paths. In Global Telecommunications Conference, 2006.
[34]
A. Serjantov and G. Danezis. Towards an Information Theoretic Metric for Anonymity. In Privacy Enhancing Technologies (PET), 2003.
[35]
M. Sherr, M. Blaze, and B. T. Loo. Scalable Link-Based Relay Selection for Anonymous Routing. In Privacy Enhancing Technologies Symposium (PETS), August 2009.
[36]
R. Smits, D. Jain, S. Pidcock, I. Goldberg, and U. Hengartner. BridgeSPA: Improving Tor Bridges with Single Packet Authorization. In ACM Workshop on Privacy in the Electronic Society (WPES), 2011.
[37]
P. Syverson. Why I'm not an Entropist. In International Workshop on Security Protocols, 2009.
[38]
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an Analysis of Onion Routing Security. In Designing Privacy Enhancing Technologies, 2000.
[39]
The Tor Project. Changelog Tor 0.2.4.12-alpha. https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ChangeLog.
[40]
Tor Project, Inc. Tor Metrics Portal. https://metrics.torproject.org/, 2013.
[41]
Tor Project, Inc. The Tor Project. https://www.torproject.org/, 2013.
[42]
TorPS. TorPS: The Tor Path Simulator. http://torps.github.io, 2013.
[43]
University of Oregon. RouteViews Project. http://www. routeviews.org/, 2013.
[44]
C. Wacek, H. Tan, K. Bauer, and M. Sherr. An Empirical Evaluation of Relay Selection in Tor. In Network and Distributed System Security Symposium (NDSS), 2013.
[45]
T. Wang, K. Bauer, C. Forero, and I. Goldberg. Congestionaware Path Selection for Tor. In Financial Cryptography and Security (FC), 2012.
[46]
L. Wasserman. All of Nonparametric Statistics (Springer Texts in Statistics). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2006.
[47]
M. Wright, M. Adler, B. N. Levine, and C. Shields. The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems. ACM Transactions on Information and System Security (TISSEC), 4(7):489--522, November 2004.

Cited By

View all
  • (2024)TOAR: Toward Resisting AS-Level Adversary Correlation Attacks Optimal Anonymous RoutingMathematics10.3390/math1223364012:23(3640)Online publication date: 21-Nov-2024
  • (2024)SRFACS: A secure and robust framework for anonymous communication systemsPLOS ONE10.1371/journal.pone.031281719:12(e0312817)Online publication date: 2-Dec-2024
  • (2024)FlowCorrGCN: Enhancing Flow Correlation Through Graph Convolutional Networks and Triplet NetworksInternational Journal of Intelligent Systems10.1155/2024/88235112024:1Online publication date: 30-Oct-2024
  • Show More Cited By

Index Terms

  1. Users get routed: traffic correlation on tor by realistic adversaries

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
    November 2013
    1530 pages
    ISBN:9781450324779
    DOI:10.1145/2508859
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 November 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anonymity
    2. metrics
    3. onion routing

    Qualifiers

    • Research-article

    Conference

    CCS'13
    Sponsor:

    Acceptance Rates

    CCS '13 Paper Acceptance Rate 105 of 530 submissions, 20%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)107
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 31 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)TOAR: Toward Resisting AS-Level Adversary Correlation Attacks Optimal Anonymous RoutingMathematics10.3390/math1223364012:23(3640)Online publication date: 21-Nov-2024
    • (2024)SRFACS: A secure and robust framework for anonymous communication systemsPLOS ONE10.1371/journal.pone.031281719:12(e0312817)Online publication date: 2-Dec-2024
    • (2024)FlowCorrGCN: Enhancing Flow Correlation Through Graph Convolutional Networks and Triplet NetworksInternational Journal of Intelligent Systems10.1155/2024/88235112024:1Online publication date: 30-Oct-2024
    • (2024)OnionVPN: Onion Routing-Based VPN-Tunnels with Onion ServicesProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695043(17-33)Online publication date: 20-Nov-2024
    • (2024)Attacking and Improving the Tor Directory Protocol2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00083(3221-3237)Online publication date: 19-May-2024
    • (2024)P-I2Prange: An Automatic Construction Architecture for Scenarios in I2P Ranges2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10651444(1-10)Online publication date: 30-Jun-2024
    • (2024)Node Selection-Based Anonymous Network Performance Optimization Method2024 9th International Conference on Computer and Communication Systems (ICCCS)10.1109/ICCCS61882.2024.10602902(456-461)Online publication date: 19-Apr-2024
    • (2024)A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and FormalizationIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335000626:3(1775-1829)Online publication date: Nov-2025
    • (2024)Navigating the Maze: Exploring Blockchain Privacy and Its Information RetrievalIEEE Access10.1109/ACCESS.2024.337085712(32089-32110)Online publication date: 2024
    • (2024)A deeper look at Ariadne: a privacy-preserving network layer protocolAnnals of Telecommunications10.1007/s12243-024-01017-579:11-12(745-762)Online publication date: 13-Mar-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media