Title

Using Traffic Analysis to Identify Tor Usage - A Proposed Study

Document Type

Conference Proceeding

Publisher

CSREA Press

Faculty

Computing, Health and Science

School

Computer & Security Science/Security Research Centre (secAU)

RAS ID

10918

Comments

This article was originally published as: Barker, J. E., Hannay, P. , & Bolan, C. M. (2010). Using Traffic Analysis to Identify Tor Usage - A Proposed Study. Proceedings of International Conference on Security & Management. (pp. 620-623). Las Vegas, Nevada, USA. CSREA Press. Original article available here.

Abstract

Traditional attacks against anonymous routing systems aim to uncover the identities of those involved, however, a more likely goal of attackers is to block or degrade the network itself, discouraging participation and forcing vulnerable users to communicate using less secure means. Since these anonymous networks operate on known protocols and employ strong encryption it is difficult to distinguish them from regular traffic. This paper proposes a method for identifying traffic belonging to anonymous networks by examining their communication patterns. If successful the method would enable the identification of Tor usage and thus allow for more directed attacks and possible user identification.

Access Rights

Free_to_read