Abstract
Anonymity systems try to conceal the relationship between the communicating entities in network communication. Popular systems, such as Tor and JAP, achieve anonymity by forwarding the traffic through a sequence of relays. In particular, Tor protocol constructs a circuit of typically 3 relays such as no single relay knows both the source and destination of the traffic. A known attack on Tor consists in injecting a set of compromised relays and wait until a Tor client picks two of them as entry (first) and exit (last) relays. With the currently large number of relays, this attack is not scalable anymore. In this paper, we take advantage of the presence of unpopular ports in Tor network to significantly increase the scalability of the attack: instead of injecting typical Tor relays (with the default exit policy), we inject only relays allowing unpopular ports. Since only a small fraction of Tor relays allow unpopular ports, the compromised relays will outnumber the valid ones. We show how Tor traffic can be redirected through unpopular ports. The experimental analysis shows that by injecting a relatively small number of compromised relays (30 pairs of relays) allowing a certain unpopular port, more than 50% of constructed circuits are compromised.
| Original language | English |
|---|---|
| Pages | 33-38 |
| Number of pages | 6 |
| DOIs | |
| Publication status | Published - 1 Dec 2013 |
| Externally published | Yes |
| Event | 33rd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2013 - Philadelphia, PA, United States Duration: 8 Jul 2013 → 11 Jul 2013 |
Conference
| Conference | 33rd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2013 |
|---|---|
| Country/Territory | United States |
| City | Philadelphia, PA |
| Period | 8/07/13 → 11/07/13 |
Keywords
- Anonymity Systems
- Censorship
- Information Security
- Network Security
- Privacy
- Tor Network