DocumentCode
2940604
Title
Design Improvement for Tor against Low-Cost Traffic Attack and Low-Resource Routing Attack
Author
Xin, Liu ; Neng, Wang
Author_Institution
Dept. of Comput. Sci. & Technol., East China Normal Univ., ShangHai
Volume
3
fYear
2009
fDate
6-8 Jan. 2009
Firstpage
549
Lastpage
554
Abstract
Tor is the second generation onion router, supporting the anonymous transport of TCP streams over the Internet. Its low latency makes it very suitable for common Internet communication applications. So Tor has become the most successful public anonymity communication service in the Internet. In this paper, we investigate Tor design weaknesses. An adversary can use these weaknesses to attack Tor network such as low-cost traffic attack, low-resource routing attack and so on. Based on the investigation we propose tuning mechanisms to overcome the above-mentioned problems. The tuning mechanisms include establishing evaluation system and optimizing Tor node store and output mode. In addition we also present a theoretical analysis to the tuning mechanisms in terms of anonymity and performance. Through our theoretical analysis, we think with our tuning mechanisms, we can promote Tor network anonymity dramatically, and promote Tor network overall performance to the extent.
Keywords
Internet; telecommunication network routing; telecommunication traffic; transport protocols; Internet; TCP streams; Tor design; Tor network; low-cost traffic attack; low-resource routing attack; public anonymity communication service; second generation onion router; tuning mechanisms; Circuits; Cryptography; IP networks; Mobile communication; Performance analysis; Protection; Relays; Routing; Telecommunication traffic; Web and internet services;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Mobile Computing, 2009. CMC '09. WRI International Conference on
Conference_Location
Yunnan
Print_ISBN
978-0-7695-3501-2
Type
conf
DOI
10.1109/CMC.2009.18
Filename
4797313
Link To Document