Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation

Soltani, M ; Sharif University of Technology

335 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISCISC.2014.6994050
  3. Abstract:
  4. TOR is one of the most famous anonymity networks. TOR works correctly when at least one honest relay exists along an established circuit. However, many attacks reveal anonymity of TOR communications by watermarking traffics, changing timings, counting cells per packets, and recently, introducing errors in cells. This paper focuses on protocol-level attacks which can de-anonymize users by changing a cell, and provides a solution for this attack by changing the way integrities of cells are checked. The proposed design allows all relays, not just the exit node, to check the integrity of cells, independently. In addition, this paper proposes a novel method, based on the concept of indistinguishability obfuscation, for dummy traffic generation within the middle relay. Finally, a method is introduced to distinguish between real and dummy flows, solely by an onion proxy (on a client's machine)
  5. Keywords:
  6. Dummy Traffic ; Indistinguishability Obfuscation ; Protocol-level Attacks ; Cells ; Cytology ; Security of data ; Anonymity networks ; Dummy traffics ; Indistinguishability ; Protocol level ; TOR ; Network security
  7. Source: 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 3- 4 September , 2014 , pp. 214-219 ; ISBN: 9781479953837
  8. URL: http://ieeexplore.ieee.org.ezp2.semantak.com/xpl/artic