An Active De-anonymizing Attack Against Tor Web Traffic

被引:0
作者
Ming Yang
Xiaodan Gu
Zhen Ling
Changxin Yin
Junzhou Luo
机构
[1] SchoolofComputerScienceandEngineering,SoutheastUniversity
关键词
traffic analysis; active website fingerprinting; anonymous communication; Tor;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Tor is pervasively used to conceal target websites that users are visiting. A de-anonymization technique against Tor, referred to as website fingerprinting attack, aims to infer the websites accessed by Tor clients by passively analyzing the patterns of encrypted traffic at the Tor client side. However, HTTP pipeline and Tor circuit multiplexing techniques can affect the accuracy of the attack by mixing the traffic that carries web objects in a single TCP connection. In this paper, we propose a novel active website fingerprinting attack by identifying and delaying the HTTP requests at the first hop Tor node. Then, we can separate the traffic that carries distinct web objects to derive a more distinguishable traffic pattern. To fulfill this goal, two algorithms based on statistical analysis and objective function optimization are proposed to construct a general packet delay scheme. We evaluate our active attack against Tor in empirical experiments and obtain the highest accuracy of 98.64%, compared with 85.95% of passive attack. We also perform experiments in the open-world scenario. When the parameter k of k-NN classifier is set to 5, then we can obtain a true positive rate of 90.96% with a false positive rate of 3.9%.
引用
收藏
页码:702 / 713
页数:12
相关论文
共 26 条
[1]  
Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services[J]. Yu Wang,Dingbang Xu,Fan Li.  Tsinghua Science and Technology. 2016(03)
[2]  
Privacy-Preserving Data Publishing for Multiple Numerical Sensitive Attributes[J]. Qinghai Liu,Hong Shen,Yingpeng Sang.  Tsinghua Science and Technology. 2015(03)
[3]  
Tor project obfsproxy. https://www.torproject.org/projects/obfsproxy.html.en . 2015
[4]  
PLANETLAB. https://www.planet-lab.org/ . 2017
[5]  
Low-resource routing attacks against anonymous systems. K.Bauer,D.Mc Coy,D.C.Grunwald,T.Kohno,D.Sicker. Tech Rep.CU-CS-1025-07,University of Colorado Boulder . 2007
[6]   A New Cell-Counting-Based Attack Against Tor [J].
Ling, Zhen ;
Luo, Junzhou ;
Yu, Wei ;
Fu, Xinwen ;
Xuan, Dong ;
Jia, Weijia .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (04) :1245-1261
[7]  
Tor directory protocol. http://tor.eff.org/svn/trunk/doc/spec/dir-spec.txt . 2015
[8]  
Tor protocol specification. https://svn.torproject.org/svn/tor/branches/hidserv-perf/doc/spec/tor-spec.txt . 2017
[9]   INFORMATION SECURITY [P]. 
PAYNE ROGER ALYN ;
BROWN PETER JOHN ;
ORMSTON CHRISTOPHER STEPHEN ;
GARRETT ANDREW JAMES .
:EP1502172B1 ,2008-08-13
[10]  
Libevent–an event notification library. http://libevent.org/ . 2017