Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits

08/28/2018
by   Herman Galteland, et al.
0

We model and analyze passive adversaries that monitors Tor traffic crossing the border of a jurisdiction an adversary is controlling. We show that a single adversary is able to connect incoming and outgoing traffic of their border, tracking the traffic, and cooperating adversaries are able to reconstruct parts of the Tor network, revealing user-server relationships. In our analysis we created two algorithms to estimate the capabilities of the adversaries. The first generates Tor-like traffic and the second analyzes and reconstructs the simulated data.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset