首页> 外文会议>International Conference on Network and System Security >Breaking Tor Anonymity with Game Theory and Data Mining
【24h】

Breaking Tor Anonymity with Game Theory and Data Mining

机译:与博弈论和数据挖掘打破匿名

获取原文

摘要

Attacking anonymous communication networks is very tempting and many attacks have already been observed. We consider the case of Tor, a widely-used anonymous overlay network. Despite the deployment of several protection mechanisms, we propose an attack originated from only one rogue exit node. Our attack is composed of two elements. The first is an active tag injection scheme. The malicious exit node injects image tags into all HTTP replies, which will be cached for upcoming requests and allows different users to be distinguished. The second element is an inference attack that leverages a semi-supervised learning algorithm to reconstruct browsing sessions. Captured traffic flows are clustered into sessions, such that one session is most probably associated to a specific user. The clustering algorithm uses HTTP headers and logical dependencies encountered in a browsing session. We have implemented a prototype and evaluated its performance on the Tor network. The article also describes several counter-measures and advanced attacks, modeled in a game-theoretical framework and their relevancy assessed with reference to the Nash equilibrium.
机译:攻击匿名通信网络非常诱人,并且已经观察到许多攻击。我们考虑Tor,一个广泛使用的匿名覆盖网络的情况。尽管部署了多种保护机制,但我们提出了源自一个流氓出口节点的攻击。我们的攻击由两个元素组成。第一个是有源标签注射方案。恶意退出节点将图像标记注入所有HTTP回复,这些回复将被高速缓存,以便于即将到来的请求,并允许区分不同的用户。第二个元素是推断攻击,它利用半监督的学习算法来重建浏览会话。捕获的流量流量被聚集到会话中,使得一个会话最可能与特定用户相关联。聚类算法使用浏览会话中遇到的HTTP标头和逻辑依赖项。我们已经实现了一种原型并在TOR网络上进行了评估其性能。本文还介绍了在游戏理论框架中建模的几种反措施和高级攻击,以及参考纳什均衡评估的相关性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号