Securing Tor Tunnels under the Selective-DoS Attack

نویسندگان

  • Anupam Das
  • Nikita Borisov
چکیده

Low-latency anonymous networks like Tor are subject to selective denial-of-service (DoS) attacks. Selective-DoS attacks lowers anonymity as it forces paths to be rebuilt multiple times to ensure delivery which increases the opportunity for more attack. In this paper we present a detection algorithm which filters out compromised tunnels from a set of Tor tunnels to ensure better anonymity. Our detection algorithm uses two levels of probing to filter out potential compromised tunnels. We perform probabilistic analysis and extensive simulation to show the robustness of our detection algorithm. We also analyze the cost of our algorithm and show a tradeoff between efficiency and computation overhead. Real world experiments reveal that our detection algorithm provides good defence against selective DoS attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Anonymous Communication Channels under the Selective DoS Attack

Anonymous communication systems are subject to selective denialof-service (DoS) attacks. Selective DoS attacks lower anonymity as they force paths to be rebuilt multiple times to ensure delivery, which increases the opportunity for more attack. We present a detection algorithm that filters out compromised communication channels for one of the most widely used anonymity networks, Tor. Our detect...

متن کامل

A Lightweight Opportunistic Tunneling

We present LOT, a lightweight ‘plug and play’ secure tunneling protocol deployed at network gateways. Two communicating gateways, A and B, running LOT would automatically detect each other and establish an efficient tunnel, securing communication between them. LOT tunnels allow A to discard spoofed packets that specify source addresses in B’s network and vice-versa. This helps to mitigate many ...

متن کامل

A potential HTTP-based application-level attack against Tor

Tor has become one of the most popular overlay networks for anonymizing TCP traffic, however, the anonymity of Tor clients is threatened by various attacks exploiting traffic analysis or Tor’s design features. Although considerable effort has beenmade to secure and improve Tor networks, little attention has been paid to various application-level attacks against Tor. In this paper, we present a ...

متن کامل

A Mechanism for Detecting and Identifying DoS attack in VANET

VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1107.3863  شماره 

صفحات  -

تاریخ انتشار 2011