Tor traffic analysis using Hidden Markov Models

Sami Zhioua*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

Tor protocol has been designed primarily to defend against traffic analysis, which threatens privacy while using Internet. In this paper, we consider a very common threat model where an attacker can observe only the local traffic between the target Tor client and the first Tor relay. We show that even with this restricted threat model, the attacker can infer relevant information about the client's traffic, in particular when exactly new circuits are constructed. This is achieved by analyzing the Tor traffic using Hidden Markov Models (HMMs). The experimental analysis shows that the proposed HMM-based approach has a high precision (93% on average) and F-measure (75% on average). The more interesting part of the paper discusses how a local attacker can identify the hops forming circuits initiated by the Tor client victim. The attack is based on sampling the timing patterns of the most "probable" paths and then estimating the likelihood of each one of them given a circuit construction packets sequence. The experimental analysis shows that the proposed approach has an acceptable precision (around 50%) as long as the time delay between HMM learning and the actual traffic analysis is relatively small.

Original languageEnglish
Pages (from-to)1075-1086
Number of pages12
JournalSecurity and Communication Networks
Volume6
Issue number9
DOIs
StatePublished - Sep 2013

Keywords

  • Anonymity
  • Tor protocol
  • Traffic analysis

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Tor traffic analysis using Hidden Markov Models'. Together they form a unique fingerprint.

Cite this