Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们 横山亮次奖 百年刊庆
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  横山亮次奖  |  百年刊庆
清华大学学报(自然科学版)  2024, Vol. 64 Issue (8): 1293-1305    DOI: 10.16511/j.cnki.qhdxxb.2024.27.013
  计算机科学与技术 本期目录 | 过刊浏览 | 高级检索 |
资源融合分配的洋葱路由网络用户守卫节点操纵
张国强1, 徐明伟1,2
1. 清华大学 计算机科学与技术系, 北京 100084;
2. 清华大学 网络科学与网络空间研究院, 北京 100084
Push and pull Tor users' guards through optimized resource portfolios
ZHANG Guoqiang1, XU Mingwei1,2
1. Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China;
2. Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
全文: PDF(4752 KB)   HTML 
输出: BibTeX | EndNote (RIS)      
摘要 第二代洋葱路由网络(the second-generation onion router,Tor)面临流量分析去匿名化威胁,分析用户流量获取成本是评估其威胁程度的重要内容。然而,现有的用户流量获取方法较少研究费效比问题。Tor客户端构建匿名通信路径时使用的守卫节点,是敌手获取用户流量的重要途径。该文针对守卫节点操纵,提出一种资源融合分配的成本优化模型: P-Group (push and pull guards through optimized resource portfolios)模型,并在此基础上进行流量分析威胁评估。P-Group模型统筹分配守卫节点操纵过程中部署可控节点和拥塞非可控节点所需的资源。同时,通过排队论方法对拥塞非可控节点的过程进行建模,利用改进的流偏移技术统筹拥塞攻击资源总量与非可控节点带宽容量以提升资源分配效益。实验结果表明: P-Group模型能够有效降低费效比;相比于简单在部署和拥塞节点间平分带宽,该模型将资源分配效益提升了20.5%;相比于传统攻击流量分配算法,其部署的可控节点中选率提升了15%;敌手操纵用户流量从非可控节点迁移到可控节点的平均成本约为数百美元。这表明用户流量获取具有成本可行性,Tor流量分析构成现实威胁。
服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
张国强
徐明伟
关键词 第二代洋葱路由网络守卫节点带宽消耗流偏移    
Abstract:[Objective] The second-generation onion router (Tor), as the most popular low-latency anonymous communication network on the Internet, is vulnerable to deanonymization attacks caused by traffic analysis. Evaluating the cost associated with acquiring user traffic is crucial to the measurement of the severity of this threat. Because of the direct correlation between Tor network entry nodes and user identities and the fact that these nodes can also be deployed by adversaries, Tor network entry nodes play a vital role in obtaining user traffic. When constructing communication circuits, Tor clients need to be compelled to select the entry nodes of adversaries, commonly referred to as guards. However, the existing approaches used to obtain user traffic by manipulating guard nodes often overlook cost-effectiveness, leading to cost evaluations that do not truthfully reflect the potential capabilities of adversaries. [Methods] To address the cost optimization issue of acquiring Tor user traffic, this study presents a novel model, i.e., the push and pull Tor users' guards through optimized resource portfolios (P-Group). The proposed method deploys controllable nodes to draw user traffic. Meanwhile, the proposed method expedites user traffic migration by utilizing general traffic to congest noncontrollable nodes that are currently used by users. This study unifies the resource measurements of both node deployment and bandwidth attacks and analyzes their correlation to enhance resource allocation efficiency. Through in-depth research into the traffic control and congestion mechanisms of the Tor protocol, P-Group employs queuing theory to quantify the reduction in the observed bandwidth of noncontrollable nodes. Moreover, the impact of attacking noncontrollable nodes with identical traffic can vary based on their bandwidth capacities. P-Group utilizes adapted flow deviation techniques to effectively coordinate the total amount of attack resources and target bandwidth capacity to optimize resource allocation. Considering the extensive operational scope and competitiveness of contemporary cloud service providers, this study assumes that the bandwidth requirements of adversaries are readily obtainable from various sources. By investigating standard hosting product prices across ten cloud service providers, including GoDaddy, the average cost of attack bandwidth is determined and integrated into the experimental assessment. [Results] The analysis and simulation results show that P-Group improves the utility and security levels while achieving a more advantageous cost-effectiveness ratio. Solely focusing on deploying controllable nodes, once their total bandwidth reaches 2% of the entire Tor network capacity, the marginal gain from investing resources decreases significantly. The utility of resource distribution has been improved by 20.5% by the proposed method compared with that of an equal split strategy between node deployment and bandwidth attacking. Furthermore, in the context of bandwidth attacks, the likelihood of planted nodes being selected by Tor clients is 15% higher than those of six traditional traffic distribution methods. With the implementation of P-Group, the average duration of the migration of user traffic from noncontrollable nodes to adversary-controllable nodes is approximately 200h, incurring costs of several hundred dollars. [Conclusions] In summary, while challenges persist in cost management within the existing methods of acquiring Tor user traffic, optimization can mitigate these hurdles to attain practical and feasible goals, thereby elevating traffic analysis attacks to a substantial threat.
Key wordsthe second-generation onion router    guards    bandwidth consumption    flow deviation
收稿日期: 2023-10-08      出版日期: 2024-07-19
通讯作者: 徐明伟,教授,E-mail:xmw@cernet.edu.cn     E-mail: xmw@cernet.edu.cn
引用本文:   
张国强, 徐明伟. 资源融合分配的洋葱路由网络用户守卫节点操纵[J]. 清华大学学报(自然科学版), 2024, 64(8): 1293-1305.
ZHANG Guoqiang, XU Mingwei. Push and pull Tor users' guards through optimized resource portfolios. Journal of Tsinghua University(Science and Technology), 2024, 64(8): 1293-1305.
链接本文:  
http://jst.tsinghuajournals.com/CN/10.16511/j.cnki.qhdxxb.2024.27.013  或          http://jst.tsinghuajournals.com/CN/Y2024/V64/I8/1293
[1] DINGLEDINE R, MATHEWSON N, SYVERSON P F. Tor:The second-generation onion router[C]//13th USENIX Security Symposium. San Diego, USA:USENIX, 2004:303-320.
[2] LOESING K, MURDOCH S J, DINGLEDINE R. A case study on measuring statistical data in the Tor anonymity network[C]//FC 2010 Workshops on Financial Cryptography and Data Security. Tenerife, Canary Islands, Spain:Springer, 2010:203-215.
[3] ISIS L, GEORGE K, OLA B, et al. Tor guard specification[EB/OL].(2023-08-25)[2023-09-21]. https://gitlab.torproject.org/tpo/core/torspec/-/blob/main/attic/text_formats/guard-spec.txt.
[4] WAN G, JOHNSON A, WAILS R, et al. Guard placement attacks on path selection algorithms for Tor[J]. Proceedings on Privacy Enhancing Technologies, 2019, 2019(4):272-291.
[5] BAUER K, MCCOY D, GRUNWALD D, et al. Low-resource routing attacks against Tor[C]//Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society. Alexandria, USA:ACM, 2007:11-20.
[6] THILL F. Hidden service tracking detection and bandwidth cheating in Tor anonymity network[D]. Luxembourg:University of Luxembourg, 2014.
[7] TAN Q F, WANG X B, SHI W, et al. An anonymity vulnerability in Tor[J]. IEEE/ACM Transactions on Networking, 2022, 30(6):2574-2587.
[8] SUN Y X, EDMUNDSON A, VANBEVER L, et al. RAPTOR:Routing attacks on privacy in Tor[C]//24th USENIX Conference on Security Symposium. Washington, USA:USENIX Association, 2015:271-286.
[9] PAPPAS V, ATHANASOPOULOS E, IOANNIDIS S, et al. Compromising anonymity using packet spinning[C]//11th International Conference on Information Security. Taipei, China:Springer, 2008:161-174.
[10] BARBERA M V, KEMERLIS V P, PAPPAS V, et al. CellFlood:Attacking Tor onion routers on the cheap[C]//18th European Symposium on Computer Security. Egham, UK:Springer, 2013:664-681.
[11] PERRY M. TorFlow:Tor network analysis[C]//Proceedings of the 2nd Hot Topics in Privacy Enhancing Technologies. Seattle, USA:IEEE, 2009:1-14.
[12] Anon. Tor metrics[EB/OL][2023-09-21]. https://metrics.torproject.org.
[13] ISIS L, GEORGE K, OLA B, et al. Tor directory protocol, version 2[EB/OL].(2023-08-25)[2024-02-01]. https://gitlab.torproject.org/tpo/core/torspec/blob/main/attic/dir-spec-v2.txt.
[14] REKHTER Y, LI T, HARES S. A border gateway protocol 4(BGP-4)[R]. San Francisco:IETF, 2006.
[15] 张瑾. Tor匿名通信系统路由选择技术研究[D].北京:北京交通大学, 2021. ZHANG J. Research on path selection technology of Tor anonymous communication system[D]. Beijing:Beijing Jiaotong University, 2021.(in Chinese)
[16] JOHNSON A, WACEK C, JANSEN R, et al. Users get routed:Traffic correlation on Tor by realistic adversaries[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer&Communications Security. Berlin, Germany:ACM, 2013:337-348.
[17] JANSEN R, HOPPER N. Shadow:Running Tor in a box for accurate and efficient experimentation[C]//19th Annual Network and Distributed System Security Symposium. San Diego, USA:The Internet Society, 2012.
[18] LI C L, XUE Y B, DONG Y F, et al. "Super nodes" in Tor:Existence and security implication[C]//Proceedings of the 27th Annual Computer Security Applications Conference. Orlando, USA:ACM, 2011:217-226.
[19] OLDENBURG L, ACAR G, DIAZ C. From "onion not found" to guard discovery[J]. Proceedings on Privacy Enhancing Technologies, 2022, 2022(1):522-543.
[20] JANSEN R, VAIDYA T, SHERR M. Point break:A study of bandwidth denial-of-service attacks against Tor[C]//28th USENIX Conference on Security Symposium. Santa Clara, USA:USENIX Association, 2019:1823-1840.
[21] ALSABAH M, BAUER K, GOLDBERG I, et al. DefenestraTor:Throwing out windows in Tor[C]//11th International Symposium on Privacy Enhancing Technologies. Waterloo, Canada:Springer, 2011:134-154.
[22] Bose S K. An introduction to queueing systems[M]. Boston:Springer, 2013.
[23] FRATTA L, GERLA M, KLEINROCK L. The flow deviation method:An approach to store-and-forward communication network design[J]. Networks, 1973, 3(2):97-133.
[24] FRATTA L, GERLA M, KLEINROCK L. Flow deviation:40 years of incremental flows for packets, waves, cars and tunnels[J]. Computer Networks, 2014, 66:18-31.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 《清华大学学报(自然科学版)》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn