TY - GEN
T1 - Changing of the guards
T2 - 2012 ACM Workshop on Privacy in the Electronic Society, WPES 2012
AU - Elahi, Tariq
AU - Bauer, Kevin
AU - Alsabah, Mashael
AU - Dingledine, Roger
AU - Goldberg, Ian
PY - 2012
Y1 - 2012
N2 - Tor is the most popular low-latency anonymity overlay network for the Internet, protecting the privacy of hundreds of thousands of people every day. To ensure a high level of security against certain attacks, Tor currently utilizes special nodes called entry guards as each client's long-term entry point into the anonymity network. While the use of entry guards provides clear and well-studied security benefits, it is unclear how well the current entry guard design achieves its security goals in practice. We design and implement Changing of the Guards (COGS), a simulation-based research framework to study Tor's entry guard design. Using COGS, we empirically demonstrate that natural, shortterm entry guard churn and explicit time-based entry guard rotation contribute to clients using more entry guards than they should, and thus increase the likelihood of profiling attacks. This churn significantly degrades Tor clients' anonymity. To understand the security and performance implications of current and alternative entry guard selection algorithms, we simulate tens of thousands of Tor clients using COGS based on Tor's entry guard selection and rotation algorithms, with real entry guard data collected over the course of eight months from the live Tor network.
AB - Tor is the most popular low-latency anonymity overlay network for the Internet, protecting the privacy of hundreds of thousands of people every day. To ensure a high level of security against certain attacks, Tor currently utilizes special nodes called entry guards as each client's long-term entry point into the anonymity network. While the use of entry guards provides clear and well-studied security benefits, it is unclear how well the current entry guard design achieves its security goals in practice. We design and implement Changing of the Guards (COGS), a simulation-based research framework to study Tor's entry guard design. Using COGS, we empirically demonstrate that natural, shortterm entry guard churn and explicit time-based entry guard rotation contribute to clients using more entry guards than they should, and thus increase the likelihood of profiling attacks. This churn significantly degrades Tor clients' anonymity. To understand the security and performance implications of current and alternative entry guard selection algorithms, we simulate tens of thousands of Tor clients using COGS based on Tor's entry guard selection and rotation algorithms, with real entry guard data collected over the course of eight months from the live Tor network.
KW - Entry guard
KW - Predecessor attack
KW - Quality of service
KW - Tor
UR - http://www.scopus.com/inward/record.url?scp=84869175529&partnerID=8YFLogxK
U2 - 10.1145/2381966.2381973
DO - 10.1145/2381966.2381973
M3 - Conference contribution
AN - SCOPUS:84869175529
SN - 9781450316637
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 43
EP - 53
BT - WPES'12 - Proceedings of the Workshop on Privacy in the Electronic Society
Y2 - 15 October 2012 through 15 October 2012
ER -