当前位置: X-MOL 学术arXiv.cs.CR › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits
arXiv - CS - Cryptography and Security Pub Date : 2018-08-28 , DOI: arxiv-1808.09237
Herman Galteland and Kristian Gj{\o}steen

We model and analyze passive adversaries that monitors Tor traffic crossing the border of a jurisdiction an adversary is controlling. We show that a single adversary is able to connect incoming and outgoing traffic of their border, tracking the traffic, and cooperating adversaries are able to reconstruct parts of the Tor network, revealing user-server relationships. In our analysis we created two algorithms to estimate the capabilities of the adversaries. The first generates Tor-like traffic and the second analyzes and reconstructs the simulated data.

中文翻译:

攻击者监控穿越其管辖边界的 Tor 流量并重建 Tor 电路

我们对被动对手进行建模和分析,这些对手监控穿越对手控制的辖区边界的 Tor 流量。我们表明,单个对手能够连接其边界的传入和传出流量,跟踪流量,并且合作的对手能够重建 Tor 网络的一部分,揭示用户-服务器关系。在我们的分析中,我们创建了两种算法来估计对手的能力。第一个生成类似 Tor 的流量,第二个分析和重建模拟数据。
更新日期:2020-01-22
down
wechat
bug