• DocumentCode
    651579
  • Title

    Attacking Tor through Unpopular Ports

  • Author

    Sulaiman, Muhammad Aliyu ; Zhioua, Sami

  • Author_Institution
    Inf. & Comput. Sci. Dept., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
  • fYear
    2013
  • fDate
    8-11 July 2013
  • Firstpage
    33
  • Lastpage
    38
  • Abstract
    Anonymity systems try to conceal the relationship between the communicating entities in network communication. Popular systems, such as Tor and JAP, achieve anonymity by forwarding the traffic through a sequence of relays. In particular, Tor protocol constructs a circuit of typically 3 relays such as no single relay knows both the source and destination of the traffic. A known attack on Tor consists in injecting a set of compromised relays and wait until a Tor client picks two of them as entry (first) and exit (last) relays. With the currently large number of relays, this attack is not scalable anymore. In this paper, we take advantage of the presence of unpopular ports in Tor network to significantly increase the scalability of the attack: instead of injecting typical Tor relays (with the default exit policy), we inject only relays allowing unpopular ports. Since only a small fraction of Tor relays allow unpopular ports, the compromised relays will outnumber the valid ones. We show how Tor traffic can be redirected through unpopular ports. The experimental analysis shows that by injecting a relatively small number of compromised relays (30 pairs of relays) allowing a certain unpopular port, more than 50% of constructed circuits are compromised.
  • Keywords
    Internet; data privacy; protocols; relay networks (telecommunication); telecommunication security; telecommunication traffic; Internet; JAP; Tor network; Tor protocol; Tor relays; Tor traffic; anonymity systems; attack scalability; communicating entities; compromised relays; entry relays; network communication; privacy; relays sequence; traffic destination; traffic source; unpopular ports; Bandwidth; Browsers; Peer-to-peer computing; Ports (Computers); Protocols; Relays; Servers; Anonymity Systems; Censorship; Information Security; Network Security; Privacy; Tor Network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE 33rd International Conference on
  • Conference_Location
    Philadelphia, PA
  • Print_ISBN
    978-1-4799-3247-4
  • Type

    conf

  • DOI
    10.1109/ICDCSW.2013.29
  • Filename
    6679859