Affiliation:
1. Wesleyan University
2. University of Massachusetts
Abstract
Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al. [2007] proposed a denial-of-service-based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this article, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the other probabilistic and verified in simulation.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference18 articles.
1. Low-resource routing attacks against tor
2. Denial of service or denial of security?
3. Heartbeat traffic to counter (n-1) attacks
4. Detecting Denial of Service Attacks in Tor
5. Das A. and Borisov N. 2011. Securing Tor tunnels under the selective DoS attack. arXiv:1107.3863v1 {cs.CR}. Das A. and Borisov N. 2011. Securing Tor tunnels under the selective DoS attack. arXiv:1107.3863v1 {cs.CR}.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献