首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor
【24h】

TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor

机译:TorWard:发现,阻止和追溯Tor上的恶意流量

获取原文
获取原文并翻译 | 示例

摘要

Tor is a popular low-latency anonymous communication system. It is, however, currently abused in various ways. Tor exit routers are frequently troubled by administrative and legal complaints. To gain an insight into such abuse, we designed and implemented a novel system, TorWard, for the discovery and the systematic study of malicious traffic over Tor. The system can avoid legal and administrative complaints, and allows the investigation to be performed in a sensitive environment such as a university campus. An intrusion detection system (IDS) is used to discover and classify malicious traffic. We performed comprehensive analysis and extensive real-world experiments to validate the feasibility and the effectiveness of TorWard. Our results show that around 10% Tor traffic can trigger IDS alerts. Malicious traffic includes P2P traffic, malware traffic (e.g., botnet traffic), denial-of-service attack traffic, spam, and others. Around 200 known malwares have been identified. To mitigate the abuse of Tor, we implemented a defense system, which processes IDS alerts, tears down, and blocks suspect connections. To facilitate forensic traceback of malicious traffic, we implemented a dual-tone multi-frequency signaling-based approach to correlate botnet traffic at Tor entry routers and that at exit routers. We carried out theoretical analysis and extensive real-world experiments to validate the feasibility and the effectiveness of TorWard for discovery, blocking, and traceback of malicious traffic.
机译:Tor是一种流行的低延迟匿名通信系统。但是,目前它以各种方式被滥用。 Tor出口路由器经常受到行政和法律投诉的困扰。为了深入了解此类滥用,我们设计并实施了一个新颖的系统TorWard,用于发现和系统研究Tor上的恶意流量。该系统可以避免法律和行政投诉,并允许在诸如大学校园之类的敏感环境中进行调查。入侵检测系统(IDS)用于发现和分类恶意流量。我们进行了全面的分析和广泛的实际实验,以验证TorWard的可行性和有效性。我们的结果表明,大约10%的Tor流量可以触发IDS警报。恶意流量包括P2P流量,恶意软件流量(例如僵尸网络流量),拒绝服务攻击流量,垃圾邮件等。已经识别出大约200种已知的恶意软件。为了减轻Tor的滥用,我们实施了防御系统,该系统可以处理IDS警报,拆除并阻止可疑连接。为了促进对恶意流量的取证追溯,我们实施了基于双音多频信令的方法,以关联Tor入口路由器和出口路由器上的僵尸网络流量。我们进行了理论分析和广泛的实际实验,以验证TorWard用于发现,阻止和追溯恶意流量的可行性和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号