Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Mix Networks Low latency - - PowerPoint PPT Presentation
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O Gorman Anonymous Networks Large Scale Simulation of Tor: Stream Mix Networks Low latency Networks Network Correlation Attacks Simulation Results Attacks Gavin O
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
◮ Start and End timing ◮ Packet counting ◮ Cross-Correlation - Pearson Function
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
20 40 60 80 100 5 10 15 20 25 Percentage of streams correctly correlated Number of ASs Fixed time window of 1s attack
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
◮ Introduce delay and measure QoS & Anonymity ◮ Test active attacks ◮ Modify Tor protocol to account for specific attacks
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O’ Gorman Anonymous Networks
Mix Networks Low latency Networks
Network Simulation Results
Attacks
Conclusion