Defending Tor from Network Adversaries: A Case Study of Network Path Prediction

10/07/2014
by   Joshua Juen, et al.
0

The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems and Internet exchanges, which can observe different overlay hops belonging to the same circuit. We aim to determine whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by running traceroutes from Tor relays to destinations around the Internet. We use the data to evaluate the accuracy of the autonomous systems and Internet exchanges that are predicted to appear on the path using state-of-the-art path inference techniques; we also consider the impact that prediction errors have on Tor security, and whether it is possible to produce a useful overestimate that does not miss important threats. Finally, we evaluate the possibility of using these predictions to actively avoid AS and IX adversaries and the challenges this creates for the design of Tor.

READ FULL TEXT

page 4

page 6

research
05/11/2022

The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources

Internet resources form the basic fabric of the digital society. They pr...
research
06/30/2021

The Threat of Offensive AI to Organizations

AI has provided us with the ability to automate tasks, extract informati...
research
03/21/2023

Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet

IP prefix hijacks allow adversaries to redirect and intercept traffic, p...
research
09/28/2018

Adversarial Attacks and Defences: A Survey

Deep learning has emerged as a strong and efficient framework that can b...
research
11/08/2018

An Internet-Scale Feasibility Study of BGP Poisoning as a Security Primitive

The security of the routing infrastructure as a set of protocols and rou...
research
05/05/2018

Towards Predicting Efficient and Anonymous Tor Circuits

The Tor anonymity system provides online privacy for millions of users, ...
research
03/26/2020

Obliviousness Makes Poisoning Adversaries Weaker

Poisoning attacks have emerged as a significant security threat to machi...

Please sign up or login with your details

Forgot password? Click here to reset