Abstract / Description of output
Kwon et al. recently showed that circuit fingerprinting attacks could be used to identify hidden service circuits, which is a key step towards linking Tor users and their activity online. In this paper, we explore an improvement to their attack that uses random forests, which achieves similar accuracy while being more robust to simple countermeasures against it. Additionally, we perform our attack from a middle node, for which an attacker needs less resources and can leverage guard fingerprinting to deanonymize users. Our evaluation shows the attack can be effectively deployed at the middle with 99.98% accuracy.
Original language | English |
---|---|
Number of pages | 2 |
Publication status | Published - 24 May 2017 |
Event | 2017 IEEE Symposium on Security and Privacy - San Jose, CA, United States Duration: 22 May 2017 → 26 May 2017 https://www.ieee-security.org/TC/SP2017/ |
Conference
Conference | 2017 IEEE Symposium on Security and Privacy |
---|---|
Abbreviated title | SP 2017 |
Country/Territory | United States |
City | San Jose, CA |
Period | 22/05/17 → 26/05/17 |
Internet address |