发表状态 | 已发表Published |
题名 | Protocol-level attacks against Tor |
作者 | |
发表日期 | 2013 |
发表期刊 | Computer Networks
![]() |
ISSN/eISSN | 1389-1286 |
卷号 | 57期号:4页码:869-886 |
摘要 | Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications over the Internet. In this paper, we present an extensive study of protocol-level attacks against Tor. Different from existing attacks, the attacks investigated in this paper can confirm anonymous communication relationships quickly and accurately by manipulating one single cell and pose a serious threat against Tor. In these attacks, a malicious entry onion router may duplicate, modify, insert, or delete cells of a TCP stream from a sender, which can cause cell recognition errors at the exit onion router. If an accomplice of the attacker at the entry onion router also controls the exit onion router and recognizes such cell recognition errors, the communication relationship between the sender and receiver will be confirmed. These attacks can also be used for launching the denial-of-service (DoS) attack to disrupt the operation of Tor. We systematically analyze the impact of these attacks and our data indicate that these attacks may drastically degrade the anonymity service that Tor provides, if the attacker is able to control a small number of Tor routers. We have implemented these attacks on Tor and our experiments validate their feasibility and effectiveness. We also present guidelines for defending against protocol-level attacks. © 2012 Elsevier B.V. All rights reserved. |
关键词 | Anonymity Mix networks Protocol-level attacks Tor |
DOI | 10.1016/j.comnet.2012.11.005 |
URL | 查看来源 |
收录类别 | SCIE |
语种 | 英语English |
WOS研究方向 | Computer Science ; Engineering ; Telecommunications |
WOS类目 | Computer Science, Hardware & Architecture ; Computer Science, Information Systems ; Engineering, Electrical & Electronic ; Telecommunications |
WOS记录号 | WOS:000317808400003 |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/1900 |
专题 | 个人在本单位外知识产出 |
作者单位 | 1.School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2.Department of Computer and Information Sciences, Towson University, Towson, MD 21252, United States 3.Department of Computer Science, University of Massachusetts Lowell, Lowell, MA 01854, United States 4.Department of Computer Science, City University of Hong Kong, Hong Kong Special Administrative Region, Hong Kong, China 5.Rector of University of Macau, Macao, China |
推荐引用方式 GB/T 7714 | Ling, Zhen,Luo, Junzhou,Yu, Weiet al. Protocol-level attacks against Tor[J]. Computer Networks, 2013, 57(4): 869-886. |
APA | Ling, Zhen, Luo, Junzhou, Yu, Wei, Fu, Xinwen, Jia, Weijia, & Zhao, Wei. (2013). Protocol-level attacks against Tor. Computer Networks, 57(4), 869-886. |
MLA | Ling, Zhen,et al."Protocol-level attacks against Tor". Computer Networks 57.4(2013): 869-886. |
条目包含的文件 | 条目无相关文件。 |
个性服务 |
查看访问统计 |
谷歌学术 |
谷歌学术中相似的文章 |
[Ling, Zhen]的文章 |
[Luo, Junzhou]的文章 |
[Yu, Wei]的文章 |
百度学术 |
百度学术中相似的文章 |
[Ling, Zhen]的文章 |
[Luo, Junzhou]的文章 |
[Yu, Wei]的文章 |
必应学术 |
必应学术中相似的文章 |
[Ling, Zhen]的文章 |
[Luo, Junzhou]的文章 |
[Yu, Wei]的文章 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论