Filters








28 Hits in 4.1 sec

RAPTOR: Routing Attacks on Privacy in Tor [article]

Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
2015 arXiv   pre-print
We demonstrate the feasibility of Raptor attacks by analyzing historical BGP data and Traceroute data as well as performing real-world attacks on the live Tor network, while ensuring that we do not harm  ...  Second, AS-level adversaries can exploit natural churn in Internet routing to lie on the BGP paths for more users over time.  ...  In this paper, we take multiple precautions to safeguard the privacy of Tor users: • Attack our own traffic.  ... 
arXiv:1503.03940v1 fatcat:rlm5dfm2pja67dfmow7yo46c4y

DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor

Hans Hanley, Yixin Sun, Sameer Wagh, Prateek Mittal
2019 Proceedings on Privacy Enhancing Technologies  
Recent work has shown that Tor is vulnerable to attacks that manipulate inter-domain routing to compromise user privacy.  ...  Proposed solutions such as Counter-RAPTOR [29] attempt to ameliorate this issue by favoring Tor entry relays that have high resilience to these attacks.  ...  Counter-RAPTOR seeks to increase resilience to inter-domain routing attacks between Tor clients and their guard relays.  ... 
doi:10.2478/popets-2019-0025 dblp:journals/popets/HanleySWM19 fatcat:s263pz6bhbcbrhp75rbf5ilxpy

Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network [article]

Nguyen Phong Hoang
2016 arXiv   pre-print
correlation attacks in the Tor network.  ...  For Tor clients proposed in previous works, users need to compile the source code on their machine and continually update the snapshot of the Internet topology in order to obtain accurate AS-path inferences  ...  Chapter 3 Anti-Raptor: Anti routing attack on privacy for a securer and scalable Tor The proposal of anti-Raptor in this chapter is an investigation [60] conducted during the master's study of the author  ... 
arXiv:1610.02065v1 fatcat:vqnsgsxnn5botkta56lxkijtiy

Tempest: Temporal Dynamics in Anonymity Systems

Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal
2018 Proceedings on Privacy Enhancing Technologies  
We present Tempest, a suite of novel attacks based on (1) client mobility, (2) usage patterns, and (3) changes in the underlying network routing.  ...  protocols for Tor such as DeNASA, TAPS, and Counter-RAPTOR; and network-layer anonymity protocols for Internet routing such as Dovetail and HORNET.  ...  The views expressed in this work are strictly those of the authors and do not necessarily reflect the official policy or position of ONR or NSF.  ... 
doi:10.1515/popets-2018-0019 dblp:journals/popets/WailsSJCM18 fatcat:e6ckcbpp3zfq7ctq6ydabuazoe

Tempest: Temporal Dynamics in Anonymity Systems [article]

Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal
2018 arXiv   pre-print
We present Tempest, a suite of novel attacks based on (1) client mobility, (2) usage patterns, and (3) changes in the underlying network routing.  ...  protocols for Tor such as DeNASA, TAPS, and Counter-RAPTOR; and network-layer anonymity protocols for Internet routing such as Dovetail and HORNET.  ...  The views expressed in this work are strictly those of the authors and do not necessarily reflect the official policy or position of ONR or NSF.  ... 
arXiv:1801.01932v2 fatcat:zgq3qgrz2jclfbc7xf3ggzzjc4

Darknet Security: A Categorization of Attacks to the Tor Network

Enrico Cambiaso, Ivan Vaccari, Luca Patti, Maurizio Aiello
2019 Zenodo  
This paper deeply investigates the literature of attacks against the Tor network, presenting the most relevant threats in this context.  ...  In order to provide an important tool for the research community, we propose an exhaustive taxonomy based on the target of the attack.  ...  Raptor Routing attacks on privacy in Tor (RAPTOR) [28] is a suite of attacks that can be launched by the Autonomous System (AS) [22] to deanonymize clients.  ... 
doi:10.5281/zenodo.3479167 fatcat:zqpeviajvvdideouoetu45ii6q

Guard Placement Attacks on Path Selection Algorithms for Tor

Gerry Wan, Aaron Johnson, Ryan Wails, Sameer Wagh, Prateek Mittal
2019 Proceedings on Privacy Enhancing Technologies  
For instance, in one attack, we show that an adversary contributing only 0.216% of Tor's total bandwidth can attain an average selection probability of 18.22%, 84× higher than what it would be under Tor  ...  The popularity of Tor has made it an attractive target for a variety of deanonymization and fingerprinting attacks.  ...  Targeted Attack -Counter-RAPTOR We next analyze targeted guard placement attacks on Counter-RAPTOR.  ... 
doi:10.2478/popets-2019-0069 dblp:journals/popets/WanJWWM19 fatcat:c7lusfn6szctrc22x35xypedre

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [chapter]

Hamish Haughey, Gregory Epiphaniou, Haider Al-Khateeb, Ali Dehghantanha
2018 Advances in Information Security  
However, anonymity in cyberspace has always been a domain of conflicting interests.  ...  While it gives enough power to nefarious actors to masquerade their illegal activities, it is also the cornerstone to facilitate freedom of speech and privacy.  ...  Firstly, we assume it is feasible to associate traffic behaviour to individuals if BGP Interception Component We consider the recently disclosed attack known as RAPTOR (Routing Attacks on Privacy in  ... 
doi:10.1007/978-3-319-73951-9_10 fatcat:3dwgjg5uwzbohjtoebzx4yuf5a

Going Dark: Terrorism on the Dark Web

Gabriel Weimann
2015 Studies in Conflict and Terrorism  
Early" Traffic Confirmation Attack," press release, July 30, 2014; Yixin Sun, Anne Edmundson, and Laurent Vanbever, et al., "RAPTOR: Routing Attacks on Privacy in Tor," March 13, 2015; and Cammy Harblson  ...  As such, the bulk of this section focuses on the illegal activities. Online Privacy Tor is used to secure the privacy of activities and communications in a number of realms.  ...  Author Contact Information Kristin Finklea Specialist in Domestic Security kfinklea@crs.loc.gov, 7-6259  ... 
doi:10.1080/1057610x.2015.1119546 fatcat:y7v6xzjsi5havfoqhf2b2n44ai

Data-plane Defenses against Routing Attacks on Tor

Henry Tan, Micah Sherr, Wenchao Zhou
2016 Proceedings on Privacy Enhancing Technologies  
This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network.  ...  Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks.  ...  The findings and opinions expressed in this paper are those of the authors and do not necessarily reflect the views of the funding agency.  ... 
doi:10.1515/popets-2016-0040 dblp:journals/popets/TanSZ16 fatcat:eeofir27b5dspgeqei2knitzzi

Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples

Ziwei Zhang, Dengpan Ye, Mamoun Alazab
2022 Security and Communication Networks  
Tor is vulnerable to flow correlation attacks, adversaries who can observe the traffic metadata (e.g., packet timing, size, etc.) between client to entry relay and exit relay to the server will deanonymize  ...  The escalating threat of this attack requires timely and effective countermeasures.  ...  Figure 1 : 1 Figure 1: e main process of flow correlation attack on Tor. e adversary intercepts Tor flows either by running malicious Tor relays or eavesdropping on Internet ASes and IXPs. 3. 1 . 1 Target  ... 
doi:10.1155/2022/2962318 fatcat:mvmqt27qezfefnesjx3hmbct7m

The Evaluation of Circuit Selection Methods on Tor [article]

Mohsen Imani, Mehrdad Amirabadi, Matthew Wright
2017 arXiv   pre-print
(TTFB) by 22% over Tor and 15% over congestion-aware routing, the state-of-the-art in Tor circuit selection.  ...  Tor provides anonymity online by routing traffic through encrypted tunnels, called circuits, over paths of anonymizing relays.  ...  Attacker Model As with prior work in Tor performance [22, 21, 6, 26] , our attention is more on performance characteristics than on attacks.  ... 
arXiv:1706.06457v1 fatcat:aqcuyug26vbczb5jl2c3y7z3py

DeNASA: Destination-Naive AS-Awareness in Anonymous Communications

Armon Barton, Matthew Wright
2016 Proceedings on Privacy Enhancing Technologies  
Then, we test the accuracy of Qiu and Gao AS-level path inference on identifying the presence of these ASes in the path, and we show that inference accuracy is 90%.  ...  Prior approaches to AS-aware path selection in Tor do not consider node bandwidth or the other characteristics that Tor uses to ensure load balancing and quality of service.  ...  In particular, we thank our shepherds Roger Dingledine and Paul Syverson, as well as the other anonymous reviewers for introducing the guard placement attack and providing insight that greatly helped improve  ... 
doi:10.1515/popets-2016-0044 dblp:journals/popets/BartonW16 fatcat:j6alhrxdmbg57mpnbjlquqedde

Towards Predicting Efficient and Anonymous Tor Circuits [article]

Armon Barton, Mohsen Imani, Jiang Ming, Matthew Wright
2018 arXiv   pre-print
The Tor anonymity system provides online privacy for millions of users, but it is slower than typical web browsing.  ...  To improve Tor performance, we propose PredicTor, a path selection technique that uses a Random Forest classifier trained on recent measurements of Tor to predict the performance of a proposed path.  ...  [36] proposed a metric that measures the resilience of the Tor network to active attacks on BGP routing called RAPTOR attacks.  ... 
arXiv:1805.01977v1 fatcat:vo6gaqm5mbgvvmjrlapr3746ze

De-anonymisation attacks on Tor: A Survey

Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, Sanjay K. Jha
2021 IEEE Communications Surveys and Tutorials  
In this survey paper, we review known Tor attacks and identify current techniques for the de-anonymisation of Tor users and hidden services.  ...  Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy.  ...  These attacks exploit the dynamics of internet routing, such as routing symmetry and routing churn.  ... 
doi:10.1109/comst.2021.3093615 fatcat:fjc3r2672bbz3m4rtdiweurmby
« Previous Showing results 1 — 15 out of 28 results