科研成果详情

发表状态已发表Published
题名A new cell-counting-based attack against tor
作者
发表日期2012
发表期刊IEEE/ACM Transactions on Networking
ISSN/eISSN1063-6692/1558-2566
卷号20期号:4页码:1245-1261
摘要

Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells (e.g., 512 B for Tor, a known real-world, circuit-based, low-latency anonymous communication network). Via extensive experiments on Tor, we found that the size of IP packets in the Tor network can be very dynamic because a cell is an application concept and the IP layer may repack cells. Based on this finding, we investigate a new cell-counting-based attack against Tor, which allows the attacker to confirm anonymous communication relationship among users very quickly. In this attack, by marginally varying the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a secret signal into the variation of cell counter of the target traffic. The embedded signal will be carried along with the target traffic and arrive at the malicious entry onion router. Then, an accomplice of the attacker at the malicious entry onion router will detect the embedded signal based on the received cells and confirm the communication relationship among users. We have implemented this attack against Tor, and our experimental data validate its feasibility and effectiveness. There are several unique features of this attack. First, this attack is highly efficient and can confirm very short communication sessions with only tens of cells. Second, this attack is effective, and its detection rate approaches 100% with a very low false positive rate. Third, it is possible to implement the attack in a way that appears to be very difficult for honest participants to detect (e.g., using our hopping-based signal embedding). © 2012 IEEE.

关键词Anonymity cell counting mix networks signal Tor
DOI10.1109/TNET.2011.2178036
URL查看来源
收录类别SCIE
语种英语English
WOS研究方向Computer Science ; Engineering ; Telecommunications
WOS类目Computer Science, Hardware & Architecture ; Computer Science, Theory & Methods ; Engineering, Electrical & Electronic ; Telecommunications
WOS记录号WOS:000307895100020
引用统计
被引频次:41[WOS]   [WOS记录]     [WOS相关记录]
文献类型期刊论文
条目标识符https://repository.uic.edu.cn/handle/39GCC9TT/1921
专题个人在本单位外知识产出
通讯作者Ling, Zhen
作者单位
1.School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
2.Department of Computer and Information Sciences, Towson University, Towson, MD 21252, United States
3.Department of Computer Science, University of Massachusetts Lowell, Lowell, MA 01854, United States
4.Department of Computer Science and Engineering, Ohio State University, Columbus, OH 43210, United States
5.Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong, 83 Tat Chee Ave, Hong Kong, China
推荐引用方式
GB/T 7714
Ling, Zhen,Luo, Junzhou,Yu, Weiet al. A new cell-counting-based attack against tor[J]. IEEE/ACM Transactions on Networking, 2012, 20(4): 1245-1261.
APA Ling, Zhen, Luo, Junzhou, Yu, Wei, Fu, Xinwen, Xuan, Dong, & Jia, Weijia. (2012). A new cell-counting-based attack against tor. IEEE/ACM Transactions on Networking, 20(4), 1245-1261.
MLA Ling, Zhen,et al."A new cell-counting-based attack against tor". IEEE/ACM Transactions on Networking 20.4(2012): 1245-1261.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Ling, Zhen]的文章
[Luo, Junzhou]的文章
[Yu, Wei]的文章
百度学术
百度学术中相似的文章
[Ling, Zhen]的文章
[Luo, Junzhou]的文章
[Yu, Wei]的文章
必应学术
必应学术中相似的文章
[Ling, Zhen]的文章
[Luo, Junzhou]的文章
[Yu, Wei]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。