DocumentCode :
33956
Title :
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
Author :
Zhen Ling ; Junzhou Luo ; Wei Yu ; Ming Yang ; Xinwen Fu
Author_Institution :
Southeast Univ., Nanjing, China
Volume :
26
Issue :
7
fYear :
2015
fDate :
Jul-15
Firstpage :
1887
Lastpage :
1899
Abstract :
Tor is a well-known low-latency anonymous communication system that is able to bypass the Internet censorship. However, publicly announced Tor routers are being blocked by various parties. To counter the censorship blocking, Tor introduced non-public bridges as the first-hop relay into its core network. In this paper, we investigated the effectiveness of two categories of bridge-discovery approaches: 1) enumerating bridges from bridge HTTPS and email servers, and 2) inferring bridges by malicious Tor middle routers. Large-scale real-world experiments were conducted and validated our theoretic findings. We discovered 2365 Tor bridges through the two enumeration approaches and 2369 bridges by only one Tor middle router in 14 days. Our study shows that the bridge discovery based on malicious middle routers is simple, efficient, and effective to discover bridges with little overhead. We also discussed issues related to bridge discovery and mechanisms to counter the malicious bridge discovery.
Keywords :
Internet; computer network security; electronic mail; transport protocols; HTTPS; Internet censorship; Tor bridge discovery; Tor routers; email servers; first-hop relay; large-scale empirical evaluation; low-latency anonymous communication system; malicious bridge discovery; nonpublic bridges; Bandwidth; Bridge circuits; Bridges; Electronic mail; IP networks; Internet; Servers; Anonymous communication; Tor; attack; bridge discovery; privacy;
fLanguage :
English
Journal_Title :
Parallel and Distributed Systems, IEEE Transactions on
Publisher :
ieee
ISSN :
1045-9219
Type :
jour
DOI :
10.1109/TPDS.2013.249
Filename :
6616552
Link To Document :
بازگشت