DocumentCode :
2665346
Title :
Using Traffic Analysis to Identify the Second Generation Onion Router
Author :
Barker, John ; Hannay, Peter ; Szewczyk, Patryk
Author_Institution :
Sch. of Comput. & Security Sci., Edith Cowan Univ., Mt Lawley, WA, Australia
fYear :
2011
fDate :
24-26 Oct. 2011
Firstpage :
72
Lastpage :
78
Abstract :
Anonymous networks provide security for users by obfuscating messages with encryption and hiding communications amongst cover traffic provided by other network participants. The traditional goal of academic research into these networks has been attacks that aim to uncover the identity of network users. But the success of an anonymous network relies not only on it´s technical capabilities, but on adoption by a large enough user base to provide adequate cover traffic. If anonymous network nodes can be identified, the users can be harassed, discouraging participation. Tor is an example of widely used anonymous network which uses a form of Onion Routing to provide low latency anonymous communications. This paper demonstrates that traffic from a simulated Tor network can be distinguished from regular encrypted traffic, suggesting that real world Tor users may be vulnerable to the same analysis.
Keywords :
computer network security; data encapsulation; public key cryptography; telecommunication network routing; telecommunication traffic; Tor users; anonymous network nodes; encryption; hiding communication; low latency anonymous communication; obfuscating messages; second generation Onion Router; traffic analysis; Educational institutions; Encryption; Machine learning algorithms; Relays; Routing; anonymity; encryption; tor; traffic analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Embedded and Ubiquitous Computing (EUC), 2011 IFIP 9th International Conference on
Conference_Location :
Melbourne, VIC
Print_ISBN :
978-1-4577-1822-9
Type :
conf
DOI :
10.1109/EUC.2011.76
Filename :
6104509
Link To Document :
بازگشت