Attacking tor through unpopular ports

Muhammad Aliyu Sulaiman, Sami Zhioua

Research output: Contribution to conferencePaperpeer-review

Abstract

Anonymity systems try to conceal the relationship between the communicating entities in network communication. Popular systems, such as Tor and JAP, achieve anonymity by forwarding the traffic through a sequence of relays. In particular, Tor protocol constructs a circuit of typically 3 relays such as no single relay knows both the source and destination of the traffic. A known attack on Tor consists in injecting a set of compromised relays and wait until a Tor client picks two of them as entry (first) and exit (last) relays. With the currently large number of relays, this attack is not scalable anymore. In this paper, we take advantage of the presence of unpopular ports in Tor network to significantly increase the scalability of the attack: instead of injecting typical Tor relays (with the default exit policy), we inject only relays allowing unpopular ports. Since only a small fraction of Tor relays allow unpopular ports, the compromised relays will outnumber the valid ones. We show how Tor traffic can be redirected through unpopular ports. The experimental analysis shows that by injecting a relatively small number of compromised relays (30 pairs of relays) allowing a certain unpopular port, more than 50% of constructed circuits are compromised.

Original languageEnglish
Pages33-38
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2013
Externally publishedYes
Event33rd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2013 - Philadelphia, PA, United States
Duration: 8 Jul 201311 Jul 2013

Conference

Conference33rd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2013
Country/TerritoryUnited States
CityPhiladelphia, PA
Period8/07/1311/07/13

Keywords

  • Anonymity Systems
  • Censorship
  • Information Security
  • Network Security
  • Privacy
  • Tor Network

Fingerprint

Dive into the research topics of 'Attacking tor through unpopular ports'. Together they form a unique fingerprint.

Cite this