log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
Youngsam Park - University of Maryland
Wednesday, November 20, 2013, 2:00-3:00 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realis- tic adversaries in the Tor network or in the underlying Internet. Our results show that Tor users are far more susceptible to compromise than indicated by prior work. Specific contributions of the paper include (1) a model of various typical kinds of users, (2) an adver- sary model that includes Tor network relays, autonomous systems (ASes), Internet exchange points (IXPs), and groups of IXPs drawn from empirical study, (3) metrics that indicate how secure users are over a period of time, (4) the most accurate topological model to date of ASes and IXPs as they relate to Tor usage and network con- figuration, (5) a novel realistic Tor path simulator (TorPS), and (6) analyses of security making use of all the above. To show that our approach is useful to explore alternatives and not just Tor as cur- rently deployed, we also analyze a published alternative path se- lection algorithm, Congestion-Aware Tor. We create an empirical model of Tor congestion, identify novel attack vectors, and show that it too is more vulnerable than previously indicated.

Bio

Youngsam Park is a graduate student in the University of Maryland with research interests in Systems and Networking.

This talk is organized by Ramakrishna Padmanabhan