Title :
Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation
Author :
Soltani, Mahdi ; Najafi, Sina ; Jalili, Rasool
Author_Institution :
Dept. of Comput. Eng., Sharif Univ. of Technol., Tehran, Iran
Abstract :
TOR is one of the most famous anonymity networks. TOR works correctly when at least one honest relay exists along an established circuit. However, many attacks reveal anonymity of TOR communications by watermarking traffics, changing timings, counting cells per packets, and recently, introducing errors in cells. This paper focuses on protocol-level attacks which can de-anonymize users by changing a cell, and provides a solution for this attack by changing the way integrities of cells are checked. The proposed design allows all relays, not just the exit node, to check the integrity of cells, independently. In addition, this paper proposes a novel method, based on the concept of indistinguishability obfuscation, for dummy traffic generation within the middle relay. Finally, a method is introduced to distinguish between real and dummy flows, solely by an onion proxy (on a client´s machine).
Keywords :
computer network security; protocols; relay networks (telecommunication); telecommunication network routing; telecommunication traffic; watermarking; TOR communications; anonymity networks; cells integrity; client machine; dummy flows; dummy traffic generation; indistinguishability obfuscation; middle relay; onion proxy; onion router; protocol-level attacks mitigation; traffics watermarking; user deanonymization; Encryption; Relays; Software; Synchronization; Watermarking; Dummy Traffic; Indistinguishability Obfuscation; Protocol-level Attacks; TOR;
Conference_Titel :
Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on
Conference_Location :
Tehran
DOI :
10.1109/ISCISC.2014.6994050