2006
DOI: 10.1007/11957454_13
|View full text |Cite
|
Sign up to set email alerts
|

Valet Services: Improving Hidden Servers with a Personal Touch

Abstract: Abstract. Location hidden services have received increasing attention as a means to resist censorship and protect the identity of service operators. Research and vulnerability analysis to date has mainly focused on how to locate the hidden service. But while the hiding techniques have improved, almost no progress has been made in increasing the resistance against DoS attacks directly or indirectly on hidden services. In this paper we suggest improvements that should be easy to adopt within the existing hidden … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…In [17], Murdoch and Danezis stage an active attack to trace back connections from a server to the victim client by modulating the traffic to the victim at the server and by remotely "sensing" the modulation by probind its interference on cross traffic that is generated by one or more corrupt Tor nodes. Similarly, Øverlier and Syverson [19], [20] describe how to locate hidden servers in the Tor network with the use of a corrupt Tor node and a client node. It is pointed out that all Tor nodes are volunteer peers; it is easy to add corrupt nodes to the network.…”
Section: Related Workmentioning
confidence: 98%
“…In [17], Murdoch and Danezis stage an active attack to trace back connections from a server to the victim client by modulating the traffic to the victim at the server and by remotely "sensing" the modulation by probind its interference on cross traffic that is generated by one or more corrupt Tor nodes. Similarly, Øverlier and Syverson [19], [20] describe how to locate hidden servers in the Tor network with the use of a corrupt Tor node and a client node. It is pointed out that all Tor nodes are volunteer peers; it is easy to add corrupt nodes to the network.…”
Section: Related Workmentioning
confidence: 98%
“…Security [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [21], [58], [59], [60], [61], [62], [63], [64], [19] 28…”
Section: Research Fieldmentioning
confidence: 99%
“…While there is always a (small) chance that the victim will select the adversary's monitor peers, the adversary uses a second type of peer, an attack peer (which performs a limited type of DoS attack) to influence the victim's tiers to the adversary's benefit. Note that, in contrast to [11], the goal of the attack is to change the fast tier, not to impact the availability or reachability of the Eepsite. Finally, the adversary also uses one peer to act as a "normal" visitor to the Eepsite, querying the I2P NetDB for leaseSets and issuing HTTP requests to the Eepsite.…”
Section: Our Attackmentioning
confidence: 99%