Effectiveness and detection of denial of service attacks in Tor

Preprint English OPEN
Danner, Norman; DeFabbia-Kane, Sam; Krizanc, Danny; Liberatore, Marc;
(2011)
  • Related identifiers: doi: 10.1145/2382448.2382449
  • Subject: C.2.0 | K.4.1 | Computer Science - Networking and Internet Architecture | Computer Science - Cryptography and Security

Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising t... View more
  • References (18)
    18 references, page 1 of 2

    Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. Lowresource routing attacks against Tor. In Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007), pages 11{20. Association for Computing Machinery, October 2007.

    Nikita Borisov, George Danezis, Prateek Mittal, and Parisa Tabriz. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pages 92{102. Association for Computing Machinery, October 2007.

    George Danezis and Len Sassaman. Heartbeat tra c to counter (n-1) attacks. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA, October 2003.

    Norman Danner, Danny Krizanc, and Marc Liberatore. Detecting denial of service attacks in Tor. In Financial Cryptography and Data Security: 13th International Conference (FC 2009), volume 5628 of Lecture Notes in Computer Science, pages 273{284. SpringerVerlag, 2009.

    Anupam Das and Nikita Borisov. Securing Tor tunnels under the selective DoS attack. arXiv:1107.3863v1 [cs.CR], 2011. URL http://arxiv.org/abs/1107.3863v1.

    Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, pages 303{320, August 2004a.

    Roger Dingledine, Vitaly Shmatikov, and Paul Syverson. Synchronous batching: From cascades to free routes. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of Lecture Notes in Computer Science, pages 186{206. SpringerVerlag, May 2004b.

    Brian N. Levine, Michael K. Reiter, Chenxi Wang, and Matthew K. Wright. Timing attacks in low-latency mix-based systems. In Ari Juels, editor, Financial Cryptography: Proceedings of the 8th International Conference (FC 2004), volume 3110 of Lecture Notes in Computer Science, pages 251{265. Springer-Verlag, February 2004.

    Steven J. Murdoch. Hot or not: Revealing hidden services by their clock skew. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pages 27{36. Association for Computing Machinery, October 2006.

    Steven J. Murdoch. Covert channel vulnerabilities in anonymity systems. PhD thesis, University of Cambridge, December 2007.

  • Related Organizations (5)
  • Metrics
Share - Bookmark