• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Critical traffic analysis on the tor network
 
  • Details
  • Full
Options
2020
Conference Paper
Title

Critical traffic analysis on the tor network

Abstract
Tor is a widely-used anonymity network with more than two million daily users. A special feature of Tor is the hidden service architecture. Hidden services are a popular method for anonymous communication or sharing web contents anonymously. A specialty in Tor is that all data packets that are sent are structured completely identical for security reasons. They are encrypted using the TLS protocol and have a fixed size of exactly 512 bytes. In an earlier implementation, Tor was an example of networks without generated traffic noise to make traffic analysis more difficult. In this work we describe a method to deanonymize any hidden service on Tor based on traffic analysis, which is a threat to anonymity online. This method allows an attacker with modest resources to deanonymize any hidden services in less than 12.5 days.
Author(s)
Platzer, Florian  
Schäfer, Marcel
Steinebach, Martin  
Mainwork
ARES 2020, 15th International Conference on Availability, Reliability and Security  
Conference
International Conference on Availability, Reliability and Security (ARES) 2020  
DOI
10.1145/3407023.3409180
Language
English
CESE  
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024