Novel Approach To Cell-Counting-Based Attack Against Tor

Abstract

Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of the secrecy systems pack the application data into equal-sized cells. Through extensive experiments on Tor, we originate that the size of IP packets in the Tor network can be very active because a cell is an application concept and the IP layer may repack cells. Based on that, we consider a new cellcounting-based attack against Tor, which allows the attacker to substantiate anonymous communication association among users very quickly. In this attack, by slightly unreliable the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a furtive signal into the dissimilarity of cell counter of the target traffic. The entrenched signal will be carried along with the target traffic and reach your destination at the malicious entry onion router. Then, an accessory of the attacker at the malicious entry onion router will identify the surrounded signal based on the received cells and confirm the communication connection among users. We have executed this attack against Tor, and our investigational data validate its possibility and effectiveness. There are several exclusive features of this attack. First, this attack is extremely efficient and can confirm very short communication sessions with only tens of cells. Second, the attack is effective, and its detection rate approaches 100% with a very low fake positive rate. Third, it is feasible to implement the attack in a way that comes into view to be very tricky for honest participants to detect.

Authors and Affiliations

K. Venkateswarlu, S. Srinivasulu, N. Rajya Lakshmi

Keywords

Related Articles

A Technique To Solve Real-World Problems In Text Classification, Computer Vision, And Bioinformatics

The key confront of online feature selection is how to create precise prediction for an example by means of a small number of active features. This is in difference to the traditional setup of online knowledge where a...

Alcohol Detection System

This system provides a unique method to curb drunken people. The system has an alcohol sensor embedded on the steering of the car. Whenever the driver starts ignition, the sensor measures the content of the alcohol i...

Voice and Gesture Based Electric-Powered Wheelchair Using ARM

A voice and gesture based system has been developed to control a wheelchair using voice commands and moment of hand i.e. Mems sensor is connected to hand. The system is divided into two main components: speech recogni...

A Novel Survey on SLA based Load leveling in Cloud Computing

The provision of Virtual Machines (VMs) in cloud is one major concern of cloud computing. Cloud Computing is nothing however a group of computing resources and services pooled along and is provided to the users on pay...

Low Power 10 PAM Transmitter Using Mixed Signal Design Approach

The mixed signal design approach for 10- level pulse amplitude modulation (10-PAM) transmitter which transmit 4-bit per symbol. The frequency is reduced thereby the power dissipation is greatly reduced. The data rate...

Download PDF file
  • EP ID EP27704
  • DOI -
  • Views 284
  • Downloads 4

How To Cite

K. Venkateswarlu, S. Srinivasulu, N. Rajya Lakshmi (2013). Novel Approach To Cell-Counting-Based Attack Against Tor. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27704