The search functionality is under construction.
The search functionality is under construction.

A Novel Protocol-Feature Attack against Tor's Hidden Service

Rui WANG, Qiaoyan WEN, Hua ZHANG, Xuelei LI

  • Full Text Views

    0

  • Cite this

Summary :

Tor is the most popular and well-researched low-latency anonymous communication network provides sender privacy to Internet users. It also provides recipient privacy by making TCP services available through “hidden service”, which allowing users not only to access information anonymously but also to publish information anonymously. However, based on our analysis of the hidden service protocol, we found a special combination of cells, which is the basic transmission unit over Tor, transmitted during the circuit creation procedure that could be used to degrade the anonymity. In this paper, we investigate a novel protocol-feature based attack against Tor's hidden service. The main idea resides in fact that an attacker could monitor traffic and manipulate cells at the client side entry router, and an adversary at the hidden server side could cooperate to reveal the communication relationship. Compared with other existing attacks, our attack reveals the client of a hidden service and does not rely on traffic analysis or watermarking techniques. We manipulate Tor cells at the entry router to generate the protocol-feature. Once our controlled entry onion routers detect such a feature, we can confirm the IP address of the client. We implemented this attack against hidden service and conducted extensive theoretical analysis and experiments over Tor network. The experiment results validate that our attack can achieve high rate of detection rate with low false positive rate.

Publication
IEICE TRANSACTIONS on Information Vol.E99-D No.4 pp.839-849
Publication Date
2016/04/01
Publicized
2016/01/13
Online ISSN
1745-1361
DOI
10.1587/transinf.2015ICP0001
Type of Manuscript
Special Section PAPER (Special Section on Information and Communication System Security)
Category
Network security

Authors

Rui WANG
  Beijing University of Posts and Telecommunications
Qiaoyan WEN
  Beijing University of Posts and Telecommunications
Hua ZHANG
  Beijing University of Posts and Telecommunications
Xuelei LI
  Beijing University of Posts and Telecommunications

Keyword