Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection.

Guoqiang Zhang,Jiahao Cao,Mingwei Xu,Qi Li
DOI: https://doi.org/10.1109/hpcc-dss-smartcity-dependsys57074.2022.00099
2022-01-01
Abstract:Traffic correlation attacks can deanonymize Tor users by capturing and analyzing traffic patterns on two end paths, i.e., the path from a client to the anonymity network and the path from the anonymity network to the destination server. Prior studies propose to obtain the two corresponding routes to ensure that no autonomous system (AS) can simultaneously appear on both end paths. However, acquiring accurate AS-level Tor paths in time is challenging due to the inaccuracy of route inference techniques, a shortage of traceroute vantage points, and the inherent dynamics of Internet routing. Moreover, it will fail to infer correct AS-level routes due to the widely deployed content delivery networks (CDNs). In this paper, we present a distance-aware Tor path selection algorithm that mitigates traffic correlation attacks merely by constraining the distances between Tor path nodes. The algorithm aims to lower the probability of traffic correlation attacks while not requiring any prior knowledge of AS-level route paths. The simulation results demonstrate that the distance-aware algorithm reduces the risk of Tor traffic correlation attacks by up to 27% compared to the existing AS-aware algorithm and outperforms it in about 88% of cases.
What problem does this paper attempt to address?