TY - GEN
T1 - Securing anonymous communication channels under the selective DoS attack
AU - Das, Anupam
AU - Borisov, Nikita
PY - 2013
Y1 - 2013
N2 - Anonymous communication systems are subject to selective denial-of-service (DoS) attacks. Selective DoS attacks lower anonymity as they force paths to be rebuilt multiple times to ensure delivery, which increases the opportunity for more attack. We present a detection algorithm that filters out compromised communication channels for one of the most widely used anonymity networks, Tor. Our detection algorithm uses two levels of probing to filter out potentially compromised tunnels. We probabilistically analyze our detection algorithm and show its robustness against selective DoS attacks through simulation. We also analyze the overhead of our algorithm and show that we can achieve better security guarantee than the conventional Tor path selection algorithm, while adding only approximately 5% bandwidth overhead to the Tor network. Finally, we validate our design with experiments using the live Tor network.
AB - Anonymous communication systems are subject to selective denial-of-service (DoS) attacks. Selective DoS attacks lower anonymity as they force paths to be rebuilt multiple times to ensure delivery, which increases the opportunity for more attack. We present a detection algorithm that filters out compromised communication channels for one of the most widely used anonymity networks, Tor. Our detection algorithm uses two levels of probing to filter out potentially compromised tunnels. We probabilistically analyze our detection algorithm and show its robustness against selective DoS attacks through simulation. We also analyze the overhead of our algorithm and show that we can achieve better security guarantee than the conventional Tor path selection algorithm, while adding only approximately 5% bandwidth overhead to the Tor network. Finally, we validate our design with experiments using the live Tor network.
KW - Anonymity
KW - Tor network
KW - denial of service (DoS) attack
UR - http://www.scopus.com/inward/record.url?scp=84883267649&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883267649&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-39884-1_31
DO - 10.1007/978-3-642-39884-1_31
M3 - Conference contribution
AN - SCOPUS:84883267649
SN - 9783642398834
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 362
EP - 370
BT - Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers
T2 - 17th International Conference on Financial Cryptography and Data Security, FC 2013
Y2 - 1 April 2013 through 5 April 2013
ER -