Paper: “Using traffic analysis to identify The Second Generation Onion Router”

Title: Using traffic analysis to identify The Second Generation Onion Router

Authors: John Barker, Peter Hannay, Patryk Szewczyk

Anonymous networks provide security for users by obfuscating messages with encryption and hiding communications amongst cover traffic provided by other network participants. The traditional goal of academic research into these networks has been attacks that aim to uncover the identity of network users. But the success of an anonymous network relies not only on it’s technical capabilities, but on adoption by a large enough user base to provide adequate cover traffic. If anonymous network nodes can be identified, the users can be harassed, discouraging participation. Tor is an example of widely used anonymous network which uses a form of Onion Routing to provide low latency anonymous communications. This paper demonstrates that traffic from a simulated Tor network can be distinguished from regular encrypted traffic, suggesting that real world Tor users may be vulnerable to the same analysis.

Files: Full Paper (PDF)

This entry was posted in paper, security. Bookmark the permalink.