Proceedings of the 15th International Conference on Availability, Reliability and Security 2020
DOI: 10.1145/3407023.3409180
|View full text |Cite
|
Sign up to set email alerts
|

Critical traffic analysis on the tor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Prior research [44,66] revealed distinct network connection patterns for these two kinds of flows. However, it is uncertain whether these attacks still work given the recent introduction of circuit padding [40,67]. Yet, we confirmed that Tor's current version still presents differences that allowed us to devise a new classifier that accurately separates clients from onion services.…”
Section: Filtering Phasementioning
confidence: 54%
See 2 more Smart Citations
“…Prior research [44,66] revealed distinct network connection patterns for these two kinds of flows. However, it is uncertain whether these attacks still work given the recent introduction of circuit padding [40,67]. Yet, we confirmed that Tor's current version still presents differences that allowed us to devise a new classifier that accurately separates clients from onion services.…”
Section: Filtering Phasementioning
confidence: 54%
“…This defensive countermeasure against circuit fingerprinting effectively neutralized the attack outlined by Kwon et al on recent versions of Tor [40,41]. Other studies [67] have confirmed that padding cells notably diminish the success rate of deanonymization attacks reliant on the analysis of Tor circuits' cells. In light of this, we seek to develop an updated circuit fingerprinting technique that will act as a pre-filtering stage prior to applying the classifier for flow correlation of Tor onion service sessions.…”
Section: Circuit Fingerprinting For Tor Onion Service Trafficmentioning
confidence: 75%
See 1 more Smart Citation
“…A completely secure system is not suitable. Although Tor is not foolproof yet, anonymity is good enough [38].…”
Section: Hidden Service Protocolmentioning
confidence: 99%
“…This article only needs traffic analysis of two nodes to achieve the basic goal. Recently, Platzer et al (2020) proposed a kind of introduction circuit attack based on statistical analysis which mainly uses the introduction circuits by controlling multiple key nodes and threatens the real location of the hidden services. The authors take the upcircuit & downcircuit loads during the creation and transmission of the introduction circuit as the basic features to judge the specific circuit location of the hidden services at the malicious nodes.…”
Section: Circuit Traffic Analysismentioning
confidence: 99%