• DocumentCode
    3704069
  • Title

    Disequilibrium: Tor´s Exit Node Selection under the Stereoscope

  • Author

    Robert Koch;Mario Golling;Gabi Dreo Rodosek

  • Author_Institution
    Dept. of Comput. Sci., Univ. der Bundeswehr Munchen, Neubiberg, Germany
  • Volume
    1
  • fYear
    2015
  • Firstpage
    942
  • Lastpage
    949
  • Abstract
    Restricted freedom of speech, political persecution or surveillance of journalists are just some examples for the vital need for anonymous communication in the Internet, such as Tor. However, there is also a downside to anonymity as it can also be used to support illegal activities, e.g., the (i) purchase of illicit goods, (ii) procurement of plans to build bombs or (iii) coordination of terrorist activities. Therefore, governmental actors such as intelligence services as well as non-governmental actors actually have comprehensible reasons in being able to break anonymity. Following these considerations, this paper is dedicated to analyse the anonymity Tor really can provide, considering monitoring and surveillance capabilities of intelligence services. Based on the assumption that the internal Tor network and the algorithms used therein provide an adequate protection even for highly advanced intelligence services, this work presents the results of a long-term analysis of the selection of the exit nodes. To this end, we have conducted an analysis over a period of one and a half years in which we have treated the Tor network mainly as a black box, focusing our evaluation on the analysis of the characteristics of the exit nodes. In practice, a significant deviation between the actual exit node selection, which takes especially the bandwidths into consideration, and the theoretical optimum "node usage distribution" can be observed, which in turn plays into the hands of intelligence services and facilitates the breaking of anonymity. Our evaluation highlights the endangerment of traffic analysis attacks by capable actors.
  • Keywords
    "IP networks","Algorithm design and analysis","Internet","Surveillance","Terrorism","Organizations"
  • Publisher
    ieee
  • Conference_Titel
    Trustcom/BigDataSE/ISPA, 2015 IEEE
  • Type

    conf

  • DOI
    10.1109/Trustcom.2015.468
  • Filename
    7345376