Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization

被引:112
作者
Biryukov, Alex [1 ]
Pustogarov, Ivan [1 ]
Weinmann, Ralf-Philipp [1 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
来源
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2013年
关键词
Tor; anonymity network; privacy; hidden services;
D O I
10.1109/SP.2013.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Tor is the most popular volunteer-based anonymity network consisting of over 3000 volunteer-operated relays. Apart from making connections to servers hard to trace to their origin it can also provide receiver privacy for Internet services through a feature called "hidden services". In this paper we expose flaws both in the design and implementation of Tor's hidden services that allow an attacker to measure the popularity of arbitrary hidden services, take down hidden services and deanonymize hidden services. We give a practical evaluation of our techniques by studying: (1) a recent case of a botnet using Tor hidden services for command and control channels; (2) Silk Road, a hidden service used to sell drugs and other contraband; (3) the hidden service of the DuckDuckGo search engine.
引用
收藏
页码:80 / 94
页数:15
相关论文
共 24 条
[21]   Leaving timing-channel fingerprints in hidden service log files [J].
Shebaro, Bilal ;
Perez-Gonzalez, Fernando ;
Crandall, Jedidiah R. .
DIGITAL INVESTIGATION, 2010, 7 :S104-S113
[22]  
The Tor Project, TOR REND SPEC
[23]   Defending anonymous communications against passive logging attacks [J].
Wright, M ;
Adler, M ;
Levine, BN ;
Shields, C .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :28-41
[24]  
Zander S., 2008, Proceedings of the 17th Conference on Security Symposium, P211