Thursday, 10 January 2013

A New Cell-Counting-Based Attack Against TOR.

Posted by Tech on Technology  |  6 comments

Abstract:

Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells. Via extensive experiments on Tor, we found that the size of IP packets in the Tor network can be very dynamic because a cell is an application concept and the IP layer may repack cells. Based on this finding, we investigate a new cell-counting-based attack against Tor, which allows the attacker to confirm anonymous communication relationship among users very quickly. In this attack, by marginally varying the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a secret signal into the variation of cell counter of the target traffic. The embedded signal will be carried along with the target traffic and arrive at the malicious entry onion router. Then, an accomplice of the attacker at themalicious entry onion router will detect the embedded signal based on the received cells and confirm the communication relationship among users. We have implemented this attack against Tor, and our experimental data validate its feasibility and effectiveness. There are several unique features of this attack. First, this attack is highly efficient and can confirm very short communication sessions with only tens of cells. Second, this attack is effective, and its detection rate approaches 100% with a very low false positive rate. Third, it is possible to implement the attack in a way that appears to be very difficult for honest participants to detect.

Notice: After Clicking, Please wait and click SKIP, Download Starts.

Download Links: [ Multiple Links available ]

10:30 Share:
About TechOnTechnology

We are Team TOT Here to Share the Content we have through the internet World. /FaceBook

6 comments:

  1. hi i am vijayakumar. i download ur codes but its not downloaded..!

    ReplyDelete
  2. Could You please update the links....................

    ReplyDelete
  3. good informative post.The new encryption methods for confidential datas over the cloud has been an important factor in cloud storage
    IEEE projects in thrissur

    ReplyDelete
  4. Hi Great Blog I Have Read Your Post It Is Very Informative And Useful Thanks For Posting And Sharing With Us And Your Writting Style Is Very Nice And Please Give Me More Information For Mca Intership Traning.
    Project Centres In Bangalore

    ReplyDelete

Get updates in your email box
Complete the form below, and we'll send you the best coupons.

Deliver via FeedBurner

Contact Us

Name

Email *

Message *

Wikipedia

Search results

Total Pageviews

Translate

About Us

We are here to share the content we have, In this site we are going to share Some IEEE Paper Implementations with their Source code and Documents. Hope it may be usefull for some Students Searching for.... Join Us @ Facebook
back to top