TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih Chun Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables abuse-plagued service providers such as Yelp to enforce access rules to police and throttle malicious requests coming from Tor while still providing service to legitimate Tor users. Further, TorPolice equips Tor with global access control for relays, enhancing Tor's resilience to botnet abuse. We show that TorPolice preserves the privacy of Tor users, implement a prototype of TorPolice, and perform extensive evaluations to validate our design goals.

Original languageEnglish (US)
Title of host publication2017 IEEE 25th International Conference on Network Protocols, ICNP 2017
PublisherIEEE Computer Society
ISBN (Electronic)9781509065011
DOIs
StatePublished - Nov 21 2017
Event25th IEEE International Conference on Network Protocols, ICNP 2017 - Toronto, Canada
Duration: Oct 10 2017Oct 13 2017

Publication series

NameProceedings - International Conference on Network Protocols, ICNP
Volume2017-October
ISSN (Print)1092-1648

Other

Other25th IEEE International Conference on Network Protocols, ICNP 2017
CountryCanada
CityToronto
Period10/10/1710/13/17

Fingerprint

Access control
Communication
Law enforcement
Botnet

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Cite this

Liu, Z., Liu, Y., Winter, P., Mittal, P., & Hu, Y. C. (2017). TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network. In 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017 [8117564] (Proceedings - International Conference on Network Protocols, ICNP; Vol. 2017-October). IEEE Computer Society. https://doi.org/10.1109/ICNP.2017.8117564

TorPolice : Towards enforcing service-defined access policies for anonymous communication in the Tor network. / Liu, Zhuotao; Liu, Yushan; Winter, Philipp; Mittal, Prateek; Hu, Yih Chun.

2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 2017. 8117564 (Proceedings - International Conference on Network Protocols, ICNP; Vol. 2017-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Liu, Z, Liu, Y, Winter, P, Mittal, P & Hu, YC 2017, TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network. in 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017., 8117564, Proceedings - International Conference on Network Protocols, ICNP, vol. 2017-October, IEEE Computer Society, 25th IEEE International Conference on Network Protocols, ICNP 2017, Toronto, Canada, 10/10/17. https://doi.org/10.1109/ICNP.2017.8117564
Liu Z, Liu Y, Winter P, Mittal P, Hu YC. TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network. In 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society. 2017. 8117564. (Proceedings - International Conference on Network Protocols, ICNP). https://doi.org/10.1109/ICNP.2017.8117564
Liu, Zhuotao ; Liu, Yushan ; Winter, Philipp ; Mittal, Prateek ; Hu, Yih Chun. / TorPolice : Towards enforcing service-defined access policies for anonymous communication in the Tor network. 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 2017. (Proceedings - International Conference on Network Protocols, ICNP).
@inproceedings{d5cb3c8997544ffa8b254309a8d205ca,
title = "TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network",
abstract = "Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables abuse-plagued service providers such as Yelp to enforce access rules to police and throttle malicious requests coming from Tor while still providing service to legitimate Tor users. Further, TorPolice equips Tor with global access control for relays, enhancing Tor's resilience to botnet abuse. We show that TorPolice preserves the privacy of Tor users, implement a prototype of TorPolice, and perform extensive evaluations to validate our design goals.",
author = "Zhuotao Liu and Yushan Liu and Philipp Winter and Prateek Mittal and Hu, {Yih Chun}",
year = "2017",
month = "11",
day = "21",
doi = "10.1109/ICNP.2017.8117564",
language = "English (US)",
series = "Proceedings - International Conference on Network Protocols, ICNP",
publisher = "IEEE Computer Society",
booktitle = "2017 IEEE 25th International Conference on Network Protocols, ICNP 2017",

}

TY - GEN

T1 - TorPolice

T2 - Towards enforcing service-defined access policies for anonymous communication in the Tor network

AU - Liu, Zhuotao

AU - Liu, Yushan

AU - Winter, Philipp

AU - Mittal, Prateek

AU - Hu, Yih Chun

PY - 2017/11/21

Y1 - 2017/11/21

N2 - Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables abuse-plagued service providers such as Yelp to enforce access rules to police and throttle malicious requests coming from Tor while still providing service to legitimate Tor users. Further, TorPolice equips Tor with global access control for relays, enhancing Tor's resilience to botnet abuse. We show that TorPolice preserves the privacy of Tor users, implement a prototype of TorPolice, and perform extensive evaluations to validate our design goals.

AB - Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables abuse-plagued service providers such as Yelp to enforce access rules to police and throttle malicious requests coming from Tor while still providing service to legitimate Tor users. Further, TorPolice equips Tor with global access control for relays, enhancing Tor's resilience to botnet abuse. We show that TorPolice preserves the privacy of Tor users, implement a prototype of TorPolice, and perform extensive evaluations to validate our design goals.

UR - http://www.scopus.com/inward/record.url?scp=85041413481&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85041413481&partnerID=8YFLogxK

U2 - 10.1109/ICNP.2017.8117564

DO - 10.1109/ICNP.2017.8117564

M3 - Conference contribution

AN - SCOPUS:85041413481

T3 - Proceedings - International Conference on Network Protocols, ICNP

BT - 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017

PB - IEEE Computer Society

ER -