【24h】

AS-awareness in Tor Path Selection

机译:在Tor Path选择中的意识

获取原文
获取外文期刊封面目录资料

摘要

Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an anonymity network grows, it becomes more secure against a given observer because the observer will see less of the network. In particular, as the Tor network grows from volunteers operating relays all over the world, it becomes less and less likely for a single autonomous system (AS) to be able to observe both ends of an anonymous connection. Yet, as the network continues to grow significantly, no analysis has been done to determine if this intuition is correct. Further, modifications to Tor's path selection algorithm to help clients avoid an AS-level observer have not been proposed and analyzed. Five years ago a previous study examined the AS-level threat against client and destination addresses chosen a priori to be likely or interesting to examine. Using an AS-level path inference algorithm with improved accuracy, more extensive Internet routing data, and, most importantly, a model of typical Tor client AS-level sources and destinations based on data gathered from the live network, we demonstrate that the threat of a single AS observing both ends of an anonymous Tor cpnnection is greater than previously thought. We look at the growth of the Tor network over the past five years and show that its explosive growth has had only a small impact on the network's robustness against an AS-level attacker. Finally, we propose and evaluate the effectiveness of some simple, AS-aware path selection algorithms that avoid the computational overhead imposed by full AS-level path inference algorithms. Our results indicate that a novel heuristic we propose is more effective against an AS-level observer than other commonly proposed heuristics for improving location diversity in path selection.
机译:Tor是一个匿名通信网络,全球数以千万路由器节点。在匿名通信的大部分文献中反映的直觉是,随着匿名网络的增长,对给定观察者变得更加安全,因为观察者将看到较少的网络。特别是,随着TOR网络从世界各地的志愿者从志愿者增长,它变得越来越少,对于单个自治系统(AS)能够观察到匿名连接的两端。然而,随着网络继续显着增长,没有进行分析来确定这种直觉是否正确。此外,对Tor的路径选择算法来帮助客户端避免AS级别观察者的修改尚未提出和分析。五年前,先前的研究检测了反对客户端的AS-Level威胁,目的地地址选择了最优先考虑或有趣的审查。使用具有改进的精度,更广泛的互联网路由数据的AS级路径推理算法,以及最重要的是,基于从现场网络收集的数据的典型Tor客户端和目的地的典型Tor客户端源和目的地的模型,我们证明了威胁观察匿名Tor Cpnection的两端的单一比以前认为是先前的思考。我们在过去五年中看着TOR网络的增长,并表明其爆炸性增长对网络对AS级别攻击者的稳健性进行了少量影响。最后,我们提出并评估了一些简单的等待路径选择算法的有效性,避免了满载的AS级路径推理算法强加的计算开销。我们的结果表明,我们提出的新型启发式对AS级别观察者比其他普遍提议的启发式更有效,以改善路径选择中的位置多样性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号