首页> 外文OA文献 >Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
【2h】

Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting

机译:基于XmL的低延迟匿名通信隐身流量分析   吞吐量指纹识别

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Anonymity systems such as Tor aim to enable users to communicate in a mannerthat is untraceable by adversaries that control a small number of machines. Toprovide efficient service to users, these anonymity systems make full use offorwarding capacity when sending traffic between intermediate relays. In thispaper, we show that doing this leaks information about the set of Tor relays ina circuit (path). We present attacks that, with high confidence and basedsolely on throughput information, can (a) reduce the attacker's uncertaintyabout the bottleneck relay of any Tor circuit whose throughput can be observed,(b) exactly identify the guard relay(s) of a Tor user when circuit throughputcan be observed over multiple connections, and (c) identify whether twoconcurrent TCP connections belong to the same Tor user, breaking unlinkability.Our attacks are stealthy, and cannot be readily detected by a user or by Torrelays. We validate our attacks using experiments over the live Tor network. Wefind that the attacker can substantially reduce the entropy of a bottleneckrelay distribution of a Tor circuit whose throughput can be observed-theentropy gets reduced by a factor of 2 in the median case. Such informationleaks from a single Tor circuit can be combined over multiple connections toexactly identify a user's guard relay(s). Finally, we are also able to link twoconnections from the same initiator with a crossover error rate of less than1.5% in under 5 minutes. Our attacks are also more accurate and require fewerresources than previous attacks on Tor.
机译:诸如Tor之类的匿名系统旨在使用户能够以控制少量机器的对手无法追踪的方式进行通信。为了向用户提供有效的服务,这些匿名系统在中间中继之间发送流量时会充分利用转发能力。在本文中,我们证明了这样做会在电路(路径)中泄漏有关Tor继电器组的信息。我们提出的攻击可以高度自信地并且仅基于吞吐量信息,可以(a)降低攻击者对可以观察到吞吐量的任何Tor电路的瓶颈继电器的不确定性,(b)准确识别Tor用户的保护继电器当可以通过多个连接观察到电路吞吐量时,(c)确定两个并发的TCP连接是否属于同一Tor用户,从而破坏了不可链接性。我们的攻击是秘密的,用户或Torrelays无法轻易检测到。我们使用在线Tor网络上的实验来验证我们的攻击。我们发现,攻击者可以实质上减少Tor电路的瓶颈中继分布的熵,该熵的吞吐量可以观察到-在中值情况下,熵减少了2倍。来自单个Tor电路的此类信息泄漏可通过多个连接进行组合,以准确标识用户的保护继电器。最终,我们还能够在不到5分钟的时间内将来自同一启动器的两个连接链接到交叉错误率小于1.5%。我们的攻击也比以前对Tor的攻击更为准确,所需的资源更少。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号