2015
DOI: 10.1515/popets-2015-0021
|View full text |Cite
|
Sign up to set email alerts
|

Defending Tor from Network Adversaries: A Case Study of Network Path Prediction

Abstract: Abstract:The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems (ASes) and Internet exchanges (IXes), which can observe different overlay hops belonging to the same circuit. We evaluate whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by collecting 17.2 million traceroutes from Tor relays to destinations around the Internet. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(35 citation statements)
references
References 34 publications
(70 reference statements)
0
35
0
Order By: Relevance
“…Once routing alternatives are known the question remains: Which route to choose? Thus typically, a centralized server is considered that can "rank" routing options to allow for path optimization with respect to adversaries [2,12,61,86], performance [143,144,159], or with respect to users' reputation [165]. Such a centralized ranking approach has been shown to be vulnerable to attacks [14,22].…”
Section: Centralization Of Network Information and Computationsmentioning
confidence: 99%
“…Once routing alternatives are known the question remains: Which route to choose? Thus typically, a centralized server is considered that can "rank" routing options to allow for path optimization with respect to adversaries [2,12,61,86], performance [143,144,159], or with respect to users' reputation [165]. Such a centralized ranking approach has been shown to be vulnerable to attacks [14,22].…”
Section: Centralization Of Network Information and Computationsmentioning
confidence: 99%
“…Similar to several prior works [11,20,21], we use Qiu and Gao's method for AS-level path inference [27]. Comparably to the recent work of Starov et al, we assume that adversaries can perform asymmetric traffic analysis attacks to deanonymize users.…”
Section: Studies Of the Threatmentioning
confidence: 99%
“…The accuracy of Qiu and Gao AS-level path inference with regards to assessing Tor has been recently questioned by Juen et al [21]. They find that only 20% of inferred paths match paths acquired from traceroute measurements and that Qiu and Gao path inference significantly overestimates the number of ASes traversed by Tor traffic.…”
Section: Qiu and Gao Accuracymentioning
confidence: 99%
See 1 more Smart Citation
“…We use the routing policies and algorithmic simulations [22] as described above to compute routes between pairs of ASes using the AS-level topology published by CAIDA [23]. AS-level path prediction between a source and destination is a thorny issue, for example the recent work from Juen, et al [26] shows that the paths predicted by BGP-based path prediction vary significantly from traceroute-based path prediction. However, our BGP-based path prediction toolkit makes use of the state-of-the-art in path inference and ASrelationship inference that have both been extensively validated with empirical measurements by Anwar et al [10] and Giotsas et al [23].…”
Section: A Predicting Potential Attacker Asesmentioning
confidence: 99%