Measuring and analyzing node families in the Tor anonymous communication network
Academic papers|更新时间:2024-06-05
|
Measuring and analyzing node families in the Tor anonymous communication network
Journal on CommunicationsVol. 36, Issue 2, Pages: 80-87(2015)
作者机构:
1. 中国科学院 计算技术研究所,北京 100190
2. 中国科学院 信息工程研究所,北京 100093
作者简介:
基金信息:
The National High Technology Research and Development Program of China(863 Program)(2011AA010701);The National High Technology Research and Development Program of China (863 Program)(2012AA013101);The National Natural Science Foundation of China(61100174);The National Key Technology R&D Program(2012BAH37B04);The National Key Technology R&D Program(2012BAH42B02)
Xiao WANG, Bin-xing FANG, Pei-peng LIU, et al. Measuring and analyzing node families in the Tor anonymous communication network[J]. Journal on Communications, 2015, 36(2): 80-87.
DOI:
Xiao WANG, Bin-xing FANG, Pei-peng LIU, et al. Measuring and analyzing node families in the Tor anonymous communication network[J]. Journal on Communications, 2015, 36(2): 80-87. DOI: 10.11959/j.issn.1000-436x.2015036.
Measuring and analyzing node families in the Tor anonymous communication network
Tor family was focused on design and given a family-level measurement of it.Based on Tor node families (over 3000) discovered from live Tor network data (from Jan.2011 to Dec.2012)
a few characteristics of Tor node families were revealed
such as family size
bandwidth
geographical distribution as well as operators providing a few big families.The analysis validated the irreplaceable role played by family design in enhancing Tor’s anonymity.Based on the measurement
security analysis showed the serious availability threat a compromised node family can cause to the Tor network.Besides
It also discussed Tor hidden families and the potential anonymity risk caused by them.
关键词
Keywords
references
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router [A ] . Proceedings of the 13th Conference on USENIX Security Symposium [C ] . 2004 .
Tor metrics portal [EB/OL ] . https://metrics.torproject.org/:TheTorProject https://metrics.torproject.org/:TheTorProject 2013 .
DINGLEDINE R , MATHEWSON N . Design of a blocking-resistant anonymity system [R ] . The Tor Project , 2006 .
HE G , YANG M , LUO J Z , et al . Online identification of Tor anonymous communication traffic [J ] . Journal of Software , 2013 , 24 ( 3 ): 540 - 556 .
THE TOR PROJECT.Tor directory protocol,version 3 [EB/OL ] . https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt , 2013 .
FEAMSTER N , DINGLEDINE R . Location diversity in anonymity networks [A ] . Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society [C ] . 2004 . 66 - 76 .
STEVEN J , MURDOCH , PIOTR ZIELIŃSKI . Sampled traffic analysis by internet-exchange-level adversaries [A ] . Proceedings of the 7th International Conference on Privacy Enhancing Technologies [C ] . 2007 . 167 - 183 .
BAUER K , MCCOY D , GRUNWALD D , et al . Low-resource routing attacks against tor [A ] . Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society [C ] . 2007 . 11 - 20 .
DINGLEDINE R , MATHEWSON N . Tor path specification [EB/OL ] . https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=path-spec.txt https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=path-spec.txt , 2013 .
LING Z , LUO J , YU W , et al . Extensive analysis and large-scale empirical evaluation of Tor bridge discovery [A ] . IEEE INFOCOM [C ] . 2012 . 2381 - 2389 .
WANG X , SHI J , FANG B , et al . An empirical analysis of family in the Tor network [A ] . IEEE International Conference on Communications [C ] . Budapest , 2013 . 1995 - 2000 .
EDMAN M , SYVERSON P . As-awareness in tor path selection [A ] . Proceedings of the 16th ACM conference on Computer and Communications Security [C ] . 2009 . 380 - 389 .
BRUCE SCHNEIER . Attacking Tor:how the NSA targets users' online anonymity [EB/OL ] . http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity:Guardian News and Media Limited http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity:Guardian News and Media Limited , 2013 .
MCCOY D , BAUER K , GRUNWALD D , et al . Shining light in dark places:understanding the tor network [A ] . Proceedings of the 8th International Symposium on Privacy Enhancing Technologies [C ] . Berlin , 2008 . 63 - 76 .
WANG X , SHI J , GUO L . Towards analyzing family misconfiguration in tor network [A ] . Computer Science and its Applications,Lecture Notes in Electrical Engineering [C ] . 2012 . 503 - 514 .
VASSERMAN E , JANSEN R , TYRA J , et al . Membership-concealing overlay networks [A ] . Proceedings of the 16th ACM Conference on Computer and Communications security [C ] . 2009 . 390 - 399 .
MCLACHLAN J , HOPPER N . On the risks of serving whenever you surf:vulnerabilities in Tor's blocking resistance design [A ] . Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society [C ] . 2009 . 31 - 40 .
LI C , XUE Y , DONG Y , et al . Super nodes in Tor:existence and security implication [A ] . Proceedings of the 27th Annual Computer Security Applications Conference [C ] . 2011 . 217 - 226 .