CellFlood: Attacking tor onion routers on the cheap

18Citations
Citations of this article
55Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we introduce a new Denial-of-Service attack against Tor Onion Routers and we study its feasibility and implications. In particular, we exploit a design flaw in the way Tor software builds virtual circuits and demonstrate that an attacker needs only a fraction of the resources required by a network DoS attack for achieving similar damage. We evaluate the effects of our attack on real Tor routers and we propose an estimation methodology for assessing the resources needed to attack any publicly accessible Tor node. Finally, we present the design and implementation of an effective solution to the problem that relies on cryptographic client puzzles, and we present results from its performance and effectiveness evaluation. © 2013 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Barbera, M. V., Kemerlis, V. P., Pappas, V., & Keromytis, A. D. (2013). CellFlood: Attacking tor onion routers on the cheap. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8134 LNCS, pp. 664–681). https://doi.org/10.1007/978-3-642-40203-6_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free