Novel Approach To Cell-Counting-Based Attack Against Tor

Abstract

Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of the secrecy systems pack the application data into equal-sized cells. Through extensive experiments on Tor, we originate that the size of IP packets in the Tor network can be very active because a cell is an application concept and the IP layer may repack cells. Based on that, we consider a new cellcounting-based attack against Tor, which allows the attacker to substantiate anonymous communication association among users very quickly. In this attack, by slightly unreliable the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a furtive signal into the dissimilarity of cell counter of the target traffic. The entrenched signal will be carried along with the target traffic and reach your destination at the malicious entry onion router. Then, an accessory of the attacker at the malicious entry onion router will identify the surrounded signal based on the received cells and confirm the communication connection among users. We have executed this attack against Tor, and our investigational data validate its possibility and effectiveness. There are several exclusive features of this attack. First, this attack is extremely efficient and can confirm very short communication sessions with only tens of cells. Second, the attack is effective, and its detection rate approaches 100% with a very low fake positive rate. Third, it is feasible to implement the attack in a way that comes into view to be very tricky for honest participants to detect.

Authors and Affiliations

K. Venkateswarlu, S. Srinivasulu, N. Rajya Lakshmi

Keywords

Related Articles

Design of Energy Efficient Logic Using Adiabatic Technique

With the adiabatic switching approach, the circuit energies are conserved rather than dissipated as heat. Depending on the application and the system requirements, this approach can be used to reduce the power dissip...

Real Time Infants monitoring by developing an Embedded Device for incubator

An Incubator is an apparatus for maintaining an infant, especially one that is ill or born before the usual gestation period. Continuous monitoring of physiological parameters is very often necessary for the evaluatio...

Person Authentication by voice and image using ANFIS and Shifted MFCC

In security systems, the interest in using biometric technologies for person authentication has grown rapidly. Voice is one of the most promising and mature biometric modalities for secured access control. Here prese...

Distributed Arithmetic Architecture based FIR Filter Implementation for Discrete Wavelet Transform

Corruption in image due to noise is most common problem faced in image pre-processing methods. Image denoising technique is one of the initial steps of image pre-processing. Noise often gets inserted in digital images...

Implementation of Multinomial Standard Product for RSA State Identify Algorithm

This paper presents architecture and modeling of public key RSA encryption/decryption systems. The RSA(rivest -shamir-adleman)algorithm is a secure, high quality public key algorithm.public key supports confidential...

Download PDF file
  • EP ID EP27704
  • DOI -
  • Views 283
  • Downloads 4

How To Cite

K. Venkateswarlu, S. Srinivasulu, N. Rajya Lakshmi (2013). Novel Approach To Cell-Counting-Based Attack Against Tor. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27704