skip to main content
10.1145/3507509.3507512acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

TNRAS: Tor Nodes Reliability Analysis Scheme

Published: 07 March 2022 Publication History

Abstract

With the rapid Internet development, the security attacks become more and more noteworthy that people have paid more concentration on personal privacy. The Onion Router (Tor), a distributed anonymous communication network, has gradually come into our field of vision for secure communicating on the Internet. However, there are still several security issues like the Sybil attack in Tor, which pose a non-negligible threat to both the network and its users. This paper proposes an ideal method Tor nodes reliability analysis scheme (TNRAS), Tor nodes reliability analysis scheme, against the Sybil attack. We explore an effective mean to reveal the Sybil or unreliable nodes in Tor. Through analyzing the general characteristics of nodes from six aspects, we can predict the unreliable nodes. We filter them and assess the remaining high reliable nodes for practical application afterwards. After that, the Tor reliable nodes analysis scheme application is implemented and analyzed. Moreover, this paper points out the definition of the Sybil nodes, high reliable nodes, and the reliability, then further assessing the nodes’ reliability. The research reveals the Sybil nodes characteristics through our six aspects detection method, and the predict model achieves to 0.928 training correlation and 0.715 validation correlation both with more than 0.8 ROC, which is of great significance for Tor with its increasing number of users and the worsening network context.

References

[1]
Atul Adya, Paramvir Bahl, Jitendra Padhye, Alec Wolman, and Lidong Zhou. 2004. A multi-radio unification protocol for IEEE 802.11 wireless networks. In Proceedings of the IEEE 1st International Conference on Broadnets Networks (BroadNets’04) IEEE, Los Alamitos, CA, 210–217. https://doi.org/10.1109/BROADNETS.2004.8
[2]
R. Dingledine, N. Mathewson, and P. Syverson. 2004.Tor: The Second-Generation Onion Router. USENIX security symposium, August 2004.
[3]
D. Chaum. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, vol. 24, no. 2, pp.84-90.
[4]
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. 2008. Sybillimit: A near-optimal social network defense against sybil attacks. IEEE symposium on security and privacy, pp.3-17.
[5]
A. Mani, I. Goldberg. 2021. ZXAD: High-volume Attack Mitigation for Tor. Privacy in the Electronic Society, pp. 1-16.
[6]
K. Ge, Y. He. 2020. Detection of Sybil Attack on Tor Resource Distribution. In 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), pp. 328-332. IEEE.
[7]
P. Winter, R. Köwer, M. Mulazzani, M. Huber, S. Schrittwieser, S. Lindskog, and E. Weippl. 2014. Spoiled onions: Exposing malicious Tor exit relays. International symposium on privacy enhancing technologies symposium, Springer, Cham, pp.304-331.
[8]
M. Juarez, S. Afroz, G. Acar, C. Diaz, and R. Greenstadt. 2014. A critical evaluation of website fingerprinting attacks. ACM SIGSAC conference on computer and communications security, New York, pp.263-274.
[9]
Z. Ling, J. Luo, W. Yu, M. Yang, and X. Fu. 2013. Tor bridge discovery: extensive analysis and large-scale empirical evaluation. IEEE transctions on parallel and distributed systems, vol.26, no.7, pp.1887-1899.
[10]
A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson. 2013. Users get routed: Traffic correlation on Tor by realistic adversaries. ACM SIGSAC conference on computer communications security, New York, pp.337-348.
[11]
B. Alex, I. Pustogarov, and R.P. Weinmann. 2013. Trawling for tor hidden services: detection, measurement, deanonymization. IEEE Symposium on security and privacy, pp.80-94.
[12]
K. Bauer, D. McCoy, D. Grunwald, T. Kohno and D. Sicker. 2007. Low-resource routing attacks against tor. ACM workshop on privacy in electronic society, New York, pp.11-20.
[13]
R. Dingledine and N. Mathewson. 2008. Tor path specification. URL: https://gitweb.torproject.org/torspec.git/tree/pathspec.txt.
[14]
A. K. Pal, D. Nath, and S. Chakraborty. 2010. A discriminatory rewarding mechanism for Sybil detection with applications to Tor. World academy of science, engineering and technology, international journal of social, behavioral, educational, economic, business and industrial engineering, vol.4, pp.152-159.
[15]
P. Winter, R. Ensafi, K. Loesing, and N. Feamster. 2016. Identifying and characterizing Sybils in the Tor network. USENIX Security Symposium, pp.1169-1185.
[16]
P. B. Godfrey, S. Shenker, and I. Stoica. 2006. Minimizing churn in distributed systems. ACM conference on applications, technologies, architectures, and protocols for computer communications, New York, pp.147-158.
[17]
V. I. Levenshtein. 1966. Binary codes capable of correcting deletions, insertions, and reversals. Soviet physics doklady, vol.10, no.8, pp. 707-710.
[18]
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. 2000. Reputation systems. Communications of the ACM, vol.43, no.12, pp.45-48.
[19]
R. Aringhieri, E. Damiani, S. Vimercati, S. Paraboschi, and P. Samarati. 2010. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. Journal of the american society for information science and technology, vol.57, no.4, pp.528-537.
[20]
P. Mike. 2009. Torflow: Tor network analysis. Hot topics in privacy enhancing technologies, pp.1-14.
[21]
B. Collier. 2021. The power to structure: exploring social worlds of privacy, technology and power in the Tor Project. Information, Communication and Society, vol.24, no.12, pp.1728-1744.

Cited By

View all
  • (2024)Blockchain transaction deanonymization using ensemble learningMultimedia Tools and Applications10.1007/s11042-024-19233-5Online publication date: 26-Apr-2024
  • (2023)Tor network anonymity evaluation based on node anonymityCybersecurity10.1186/s42400-023-00191-86:1Online publication date: 8-Nov-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCNS '21: Proceedings of the 2021 11th International Conference on Communication and Network Security
December 2021
106 pages
ISBN:9781450386425
DOI:10.1145/3507509
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 March 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Tor
  2. anonymous communication
  3. reliability
  4. reliable nodes
  5. the Sybil attack

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ICCNS 2021

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Blockchain transaction deanonymization using ensemble learningMultimedia Tools and Applications10.1007/s11042-024-19233-5Online publication date: 26-Apr-2024
  • (2023)Tor network anonymity evaluation based on node anonymityCybersecurity10.1186/s42400-023-00191-86:1Online publication date: 8-Nov-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media