首页> 外文会议>International conference on ICT systems security and privacy protection >Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor
【24h】

Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor

机译:BGP REROUTING防护选择算法的安全性和绩效影响

获取原文

摘要

Tor is the most popular anonymization system with millions of daily users and, thus, an attractive target for attacks, e.g., by malicious autonomous systems (ASs) performing active routing attacks to become man in the middle and deanonymize users. It was shown that the number of such malicious ASs is significantly larger than previously expected due to the lack of security guarantees in the Border Gateway Protocol (BGP). In response, recent works suggest alternative Tor path selection methods prefering Tor nodes with higher resilience to active BGP attacks. In this work, we analyze the implications of such proposals. We show that Counter-RAPTOR and DPSelect are not as secure as thought before: for particular users they allow for leakage of user's location. DPSelect is not as resilient as widely accepted as we show that it achieves only one third of its originally claimed resilience and, hence, does not protect users from routing attacks. We reveal the performance implications of both methods and identify scenarios where their usage leads to significant performance bottlenecks. Finally, we propose a new metric to quantify the user's location leakage by path selection. Using this metric and performing large-scale analysis, we show to which extent a malicious middle can fingerprint the user's location and what kind of confidence it can achieve. Our findings shed light on the implications of path selection methods on the users' anonymity and the need for further research.
机译:Tor是具有数百万日常用户的最受欢迎的匿名系统,因此是攻击的有吸引力的目标,例如,通过恶意自治系统(ASS)执行主动路由攻击,成为中间和Deanymyize用户的人。结果表明,由于边境网关协议(BGP)中缺乏安全保证,这种恶意屁股的数量明显大于先前预期的。作为响应,最近的作品建议替代的TOR路径选择方法更喜欢具有更高恢复性的TOR节点以激活的BGP攻击。在这项工作中,我们分析了这些提案的影响。我们表明,反猛禽和DPSelect并不像之前的想法一样安全:对于他们允许用户的位置泄漏的特定用户。 DPSelect并不像广泛接受的那样有弹性,因为我们表明它只能实现其最初声称的恢复力的三分之一,因此不会保护用户免于路由攻击。我们揭示了两种方法的绩效影响,并识别其使用情况导致重要性能瓶颈的情景。最后,我们提出了一种新的指标来通过路径选择量化用户的位置泄漏。使用这种度量和执行大规模分析,我们展示了恶意中间可以指纹用户的位置,它可以实现什么样的信心。我们的调查结果阐明了路径选择方法对用户匿名的影响以及进一步研究的需要。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号