SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP

Tor is one of most popular low-latency anonymous communication networks. In addition to provide anonymity for users, Tor also provide anonymity to the service provider through hidden service protocol. In September 2017, The Tor Project, Inc. launched Tor with hidden services version 3 support. Hi...

Full description

Saved in:
Bibliographic Details
Main Author: Adari, Kevin
Format: Theses
Language:Indonesia
Subjects:
Online Access:https://digilib.itb.ac.id/gdl/view/47993
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:47993
spelling id-itb.:479932020-06-25T08:06:28ZSECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP Adari, Kevin Teknik (Rekayasa, enjinering dan kegiatan berkaitan) Indonesia Theses security, anonymous network, Tor, hidden service, man-in-the-middle, censor. INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/47993 Tor is one of most popular low-latency anonymous communication networks. In addition to provide anonymity for users, Tor also provide anonymity to the service provider through hidden service protocol. In September 2017, The Tor Project, Inc. launched Tor with hidden services version 3 support. Hidden services version 3 has some improvements in cryptography algorithm, onion address, introduction protocol, rendezvous protocol, and directory protocol. A number of research projects have been conducted regarding security of hidden services. However, most of the research does not include hidden services version 3 protocol into consideration. Therefore, this study aims to shows how hidden services version 3 protocol works against previously known attacks. Main focus is around two kind of attacks, i.e. man-in-the-middle attack and censor attack. This work also provides complementary insight from empirical analysis of real Tor network data. This study shows that security of hidden services against man-in-the-middle attack relies on Introduction Point, Rendezvous Point, and descriptor. Security of hidden services against censoring relies on HSDir, Introduction Point, or descriptor. Adversary has only 2.97% success rate of Sybil attack to compromise Introduction Point by controlling 53 relays with 5 days uptime and 100 KB/s bandwidth. Adversary has only 1% success rate of Sybil attack to compromise Rendezvous Point by controlling 54 relays with 100 KB/s bandwidth. The success of these attacks will also be limited to only 24 hours. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
topic Teknik (Rekayasa, enjinering dan kegiatan berkaitan)
spellingShingle Teknik (Rekayasa, enjinering dan kegiatan berkaitan)
Adari, Kevin
SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP
description Tor is one of most popular low-latency anonymous communication networks. In addition to provide anonymity for users, Tor also provide anonymity to the service provider through hidden service protocol. In September 2017, The Tor Project, Inc. launched Tor with hidden services version 3 support. Hidden services version 3 has some improvements in cryptography algorithm, onion address, introduction protocol, rendezvous protocol, and directory protocol. A number of research projects have been conducted regarding security of hidden services. However, most of the research does not include hidden services version 3 protocol into consideration. Therefore, this study aims to shows how hidden services version 3 protocol works against previously known attacks. Main focus is around two kind of attacks, i.e. man-in-the-middle attack and censor attack. This work also provides complementary insight from empirical analysis of real Tor network data. This study shows that security of hidden services against man-in-the-middle attack relies on Introduction Point, Rendezvous Point, and descriptor. Security of hidden services against censoring relies on HSDir, Introduction Point, or descriptor. Adversary has only 2.97% success rate of Sybil attack to compromise Introduction Point by controlling 53 relays with 5 days uptime and 100 KB/s bandwidth. Adversary has only 1% success rate of Sybil attack to compromise Rendezvous Point by controlling 54 relays with 100 KB/s bandwidth. The success of these attacks will also be limited to only 24 hours.
format Theses
author Adari, Kevin
author_facet Adari, Kevin
author_sort Adari, Kevin
title SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP
title_short SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP
title_full SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP
title_fullStr SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP
title_full_unstemmed SECURITY ANALYSIS OF TOR HIDDEN SERVICES VERSION 3: MITM AND CENSORSHIP
title_sort security analysis of tor hidden services version 3: mitm and censorship
url https://digilib.itb.ac.id/gdl/view/47993
_version_ 1822927794229739520