Details of Research Outputs

TitleA new cell counter based attack against Tor
Creator
Date Issued2009
Conference Name16th ACM Conference on Computer and Communications Security, CCS'09
Source PublicationProceedings of the ACM Conference on Computer and Communications Security
ISBN978-1-60558-894-0
Pages578-589
Conference DateNOV 09-13, 2009
Conference PlaceChicago, Illinois, USA
Abstract

Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of users, many anonymity systems pack the application data into equal-sized cells (e.g., 512 bytes for Tor, a known real-world, circuit-based low-latency anonymous communication network). In this paper, we investigate a new cell counter based attack against Tor, which allows the attacker to confirm anonymous communication relationship among users very quickly. In this attack, by marginally varying the counter of cells in the target traffic at the malicious exit onion router, the attacker can embed a secret signal into the variation of cell counter of the target traffic. The embedded signal will be carried along with the target traffic and arrive at the malicious entry onion router. Then an accomplice of the attacker at the malicious entry onion router will detect the embedded signal based on the received cells and confirm the communication relationship among users. We have implemented this attack against Tor and our experimental data validate its feasibility and effectiveness. There are several unique features of this attack. First, this attack is highly efficient and can confirm very short communication sessions with only tens of cells. Second, this attack is effective and its detection rate approaches 100% with a very low false positive rate. Third, it is possible to implement the attack in a way that appears to be very difficult for honest participants to detect (e.g. using our hopping-based signal embedding). Copyright 2009 ACM.

KeywordAnonymity Cell counter Mix networks Signal Tor
DOI10.1145/1653662.1653732
URLView source
Indexed ByCPCI-S
Language英语English
WOS Research AreaComputer Science ; Telecommunications
WOS SubjectComputer Science, Theory & Methods ; Telecommunications
WOS IDWOS:000281662800053
Citation statistics
Cited Times:12[WOS]   [WOS Record]     [Related Records in WOS]
Document TypeConference paper
Identifierhttp://repository.uic.edu.cn/handle/39GCC9TT/4541
CollectionResearch outside affiliated institution
Affiliation
1.Southeast University, 2 Sipailou, Nanjing 210096, China
2.Towson University, 8000 York Road, Towson, MD 21252, United States
3.University of Massachusetts Lowell, One University Avenue, Lowell, MA 01854, United States
4.Ohio State University, 2015 Neil Avenue, Columbus, OH 43210, United States
5.City University of Hong Kong, 83 Tat Chee Avenue, Kowloon, Hong Kong, China
Recommended Citation
GB/T 7714
Ling, Zhen,Luo, Junzhou,Yu, Weiet al. A new cell counter based attack against Tor[C], 2009: 578-589.
Files in This Item:
There are no files associated with this item.
Related Services
Usage statistics
Google Scholar
Similar articles in Google Scholar
[Ling, Zhen]'s Articles
[Luo, Junzhou]'s Articles
[Yu, Wei]'s Articles
Baidu academic
Similar articles in Baidu academic
[Ling, Zhen]'s Articles
[Luo, Junzhou]'s Articles
[Yu, Wei]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Ling, Zhen]'s Articles
[Luo, Junzhou]'s Articles
[Yu, Wei]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.