Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent years, the anonymous communication system Tor that prevents the user’s access destination website from being specified has become widespread. However, attack methods for anonymity are gradually evolving. As one of the attack methods, there is a “web fingerprint attack” that identifies the Web site accessed by the user from the characteristics of the flowing packets. Therefore, in this paper, we examine a defense method against fingerprint attack against Tor. We devised a method to rewrite the “user fingerprint information” in the access history of legitimate users by analyzing the Tor Hidden Service packet and accessing the target site and dummy site simultaneously using approximate routing with multiple Tor browsers did. This “dummy user generated noise” shows that the effect of fingerprint attack can be reduced.

Cite

CITATION STYLE

APA

Takahashi, M., Narita, M., Inomata, T., & Sugino, E. (2020). Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication. In Advances in Intelligent Systems and Computing (Vol. 1150 AISC, pp. 745–755). Springer. https://doi.org/10.1007/978-3-030-44038-1_68

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free