MOR: Monitoring and Measurements through the Onion Router

نویسندگان

  • Demetres Antoniades
  • Evangelos P. Markatos
  • Constantinos Dovrolis
چکیده

A free and easy to use distributed monitoring and measurement platform would be valuable in several applications: monitoring network or server infrastructures, performing research experiments using many ISPs and test nodes, or checking for network neutrality violations performed by service providers. In this paper we present MOR, a technique for performing distributed measurement and monitoring tasks using the geographically diverse infrastructure of the Tor anonymizing network. Through several case studies, we show the applicability and value of MOR in revealing the structure and function of large hosting infrastructures and detecting network neutrality violations. Our experiments show that about 7.5% of the tested organizations block at least one popular application port and about 5.5% of them modify HTTP headers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

More Anonymity through Trust Degree in Trust-Based Onion Routing

Trust-based onion routing employs users’ own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attacks based on a priori trust relationships. In this paper, we first observe that the onion routers with higher trust degrees (e.g., those that are trusted by more other users) are more effective in defending against the inference atta...

متن کامل

Anonymous Connections and Onion Routing

Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c analysis. Onion routing's anonymous connections are bidirectional and near realtime, and can be used anywhere a socket connection can be used. Any identifying information must be in the data stream carried over an anony...

متن کامل

A Class of New Protocol-Level Attacks against Tor

Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications over the Internet. In this paper, we present a new class of attacks, protocol-level attacks, against Tor. Different from existing attacks, these attacks can confirm anonymous communication relationships quickly and accurately by manipulating one single cell and pose a serious threat again...

متن کامل

One Cell is Enough to Break Tor’s Anonymity

Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications over the Internet. In this paper, we present a new class of attacks, protocol-level attacks, against Tor. Different from existing attacks, these attacks can confirm anonymous communication relationships quickly and accurately by manipulating one single cell and pose a serious threat again...

متن کامل

Novel Approach To Cell-Counting-Based Attack Against Tor

Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of the secrecy systems pack the application data into equal-sized cells. Through extensive experiments on Tor, we originate that the size of IP packets in the Tor network can be very ac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010