Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243824
|View full text |Cite
|
Sign up to set email alerts
|

DeepCorr

Abstract: Flow correlation is the core technique used in a multitude of deanonymization attacks on Tor. Despite the importance of ow correlation attacks on Tor, existing ow correlation techniques are considered to be ine ective and unreliable in linking Tor ows when applied at a large scale, i.e., they impose high rates of false positive error rates or require impractically long ow observations to be able to make reliable correlations. In this paper, we show that, unfortunately, ow correlation attacks can be conducted o… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
55
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 101 publications
(58 citation statements)
references
References 71 publications
3
55
0
Order By: Relevance
“…Active correlation attacks usually refer to the artificial implementation of interference factors including watermarks 4 and traffic replay 6 on hijacked flow with less disturbed observation effect by the environment, and lack concealment measures. Passive correlation attacks, 8–10 a mainstream in current research areas, have simple deployment and significant attack performance. The attacker only observes and counts the two‐way flow at a fixed location and then imports traffic data to the background for granularity analysis.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Active correlation attacks usually refer to the artificial implementation of interference factors including watermarks 4 and traffic replay 6 on hijacked flow with less disturbed observation effect by the environment, and lack concealment measures. Passive correlation attacks, 8–10 a mainstream in current research areas, have simple deployment and significant attack performance. The attacker only observes and counts the two‐way flow at a fixed location and then imports traffic data to the background for granularity analysis.…”
Section: Related Workmentioning
confidence: 99%
“…In the case of unreliable network transmission conditions or encrypted flow generated by small targets such as P2P, Web browsing, file transfer protocol (FTP), and instant messaging (IM), 9 a large‐scale flow sequence comparison is required to reach a high accuracy rate. If an attack model encounters a small target similar to the descriptor publishing flow, the probability of a high false‐positive rate will be increased, 10 greatly obstructing the ideal attack benefits. The DeepCorr attack system designed by Nasr et al 10 broke through the traditional statistical measurement method, which relied on the flow correlation function for Tor.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations