Using Traffic Analysis to Identify Tor Usage - A Proposed Study
Document Type
Conference Proceeding
Publisher
CSREA Press
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science / Security Research Centre (secAU)
RAS ID
10918
Abstract
Traditional attacks against anonymous routing systems aim to uncover the identities of those involved, however, a more likely goal of attackers is to block or degrade the network itself, discouraging participation and forcing vulnerable users to communicate using less secure means. Since these anonymous networks operate on known protocols and employ strong encryption it is difficult to distinguish them from regular traffic. This paper proposes a method for identifying traffic belonging to anonymous networks by examining their communication patterns. If successful the method would enable the identification of Tor usage and thus allow for more directed attacks and possible user identification.
Access Rights
Free_to_read
Comments
Barker, J. E., Hannay, P. , & Bolan, C. M. (2010). Using Traffic Analysis to Identify Tor Usage - A Proposed Study. Proceedings of International Conference on Security & Management. (pp. 620-623). Las Vegas, Nevada, USA. CSREA Press. Available here.