SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP
Tor is one of most popular low-latency anonymous communication networks. In addition to provide anonymity for users, Tor also provide anonymity to the service provider through hidden service protocol. In September 2017, The Tor Project, Inc. launched Tor with hidden services version 3 support. Hi...
Saved in:
Main Author: | |
---|---|
Format: | Theses |
Language: | Indonesia |
Subjects: | |
Online Access: | https://digilib.itb.ac.id/gdl/view/47993 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
id |
id-itb.:47993 |
---|---|
spelling |
id-itb.:479932020-06-25T08:06:28ZSECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP Adari, Kevin Teknik (Rekayasa, enjinering dan kegiatan berkaitan) Indonesia Theses security, anonymous network, Tor, hidden service, man-in-the-middle, censor. INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/47993 Tor is one of most popular low-latency anonymous communication networks. In addition to provide anonymity for users, Tor also provide anonymity to the service provider through hidden service protocol. In September 2017, The Tor Project, Inc. launched Tor with hidden services version 3 support. Hidden services version 3 has some improvements in cryptography algorithm, onion address, introduction protocol, rendezvous protocol, and directory protocol. A number of research projects have been conducted regarding security of hidden services. However, most of the research does not include hidden services version 3 protocol into consideration. Therefore, this study aims to shows how hidden services version 3 protocol works against previously known attacks. Main focus is around two kind of attacks, i.e. man-in-the-middle attack and censor attack. This work also provides complementary insight from empirical analysis of real Tor network data. This study shows that security of hidden services against man-in-the-middle attack relies on Introduction Point, Rendezvous Point, and descriptor. Security of hidden services against censoring relies on HSDir, Introduction Point, or descriptor. Adversary has only 2.97% success rate of Sybil attack to compromise Introduction Point by controlling 53 relays with 5 days uptime and 100 KB/s bandwidth. Adversary has only 1% success rate of Sybil attack to compromise Rendezvous Point by controlling 54 relays with 100 KB/s bandwidth. The success of these attacks will also be limited to only 24 hours. text |
institution |
Institut Teknologi Bandung |
building |
Institut Teknologi Bandung Library |
continent |
Asia |
country |
Indonesia Indonesia |
content_provider |
Institut Teknologi Bandung |
collection |
Digital ITB |
language |
Indonesia |
topic |
Teknik (Rekayasa, enjinering dan kegiatan berkaitan) |
spellingShingle |
Teknik (Rekayasa, enjinering dan kegiatan berkaitan) Adari, Kevin SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP |
description |
Tor is one of most popular low-latency anonymous communication networks. In
addition to provide anonymity for users, Tor also provide anonymity to the service
provider through hidden service protocol. In September 2017, The Tor Project, Inc.
launched Tor with hidden services version 3 support. Hidden services version 3 has
some improvements in cryptography algorithm, onion address, introduction
protocol, rendezvous protocol, and directory protocol. A number of research
projects have been conducted regarding security of hidden services. However, most
of the research does not include hidden services version 3 protocol into
consideration. Therefore, this study aims to shows how hidden services version 3
protocol works against previously known attacks. Main focus is around two kind of
attacks, i.e. man-in-the-middle attack and censor attack. This work also provides
complementary insight from empirical analysis of real Tor network data.
This study shows that security of hidden services against man-in-the-middle attack
relies on Introduction Point, Rendezvous Point, and descriptor. Security of hidden
services against censoring relies on HSDir, Introduction Point, or descriptor.
Adversary has only 2.97% success rate of Sybil attack to compromise Introduction
Point by controlling 53 relays with 5 days uptime and 100 KB/s bandwidth.
Adversary has only 1% success rate of Sybil attack to compromise Rendezvous
Point by controlling 54 relays with 100 KB/s bandwidth. The success of these
attacks will also be limited to only 24 hours. |
format |
Theses |
author |
Adari, Kevin |
author_facet |
Adari, Kevin |
author_sort |
Adari, Kevin |
title |
SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP |
title_short |
SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP |
title_full |
SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP |
title_fullStr |
SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP |
title_full_unstemmed |
SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP |
title_sort |
security analysis of tor hidden services version 3: mitm and censorship |
url |
https://digilib.itb.ac.id/gdl/view/47993 |
_version_ |
1822927794229739520 |