Attacking tor through unpopular ports

Muhammad Aliyu Sulaiman, Sami Zhioua

Research output: Contribution to conferencePaperpeer-review

13 Scopus citations

Abstract

Anonymity systems try to conceal the relationship between the communicating entities in network communication. Popular systems, such as Tor and JAP, achieve anonymity by forwarding the traffic through a sequence of relays. In particular, Tor protocol constructs a circuit of typically 3 relays such as no single relay knows both the source and destination of the traffic. A known attack on Tor consists in injecting a set of compromised relays and wait until a Tor client picks two of them as entry (first) and exit (last) relays. With the currently large number of relays, this attack is not scalable anymore. In this paper, we take advantage of the presence of unpopular ports in Tor network to significantly increase the scalability of the attack: instead of injecting typical Tor relays (with the default exit policy), we inject only relays allowing unpopular ports. Since only a small fraction of Tor relays allow unpopular ports, the compromised relays will outnumber the valid ones. We show how Tor traffic can be redirected through unpopular ports. The experimental analysis shows that by injecting a relatively small number of compromised relays (30 pairs of relays) allowing a certain unpopular port, more than 50% of constructed circuits are compromised.

Original languageEnglish
Pages33-38
Number of pages6
DOIs
StatePublished - 2013

Keywords

  • Anonymity Systems
  • Censorship
  • Information Security
  • Network Security
  • Privacy
  • Tor Network

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Attacking tor through unpopular ports'. Together they form a unique fingerprint.

Cite this