{"title":"Discovering Onion Services Through Circuit Fingerprinting Attacks","authors":"Bin Huang, Yanhui Du","doi":"10.1109/SEC54971.2022.00076","DOIUrl":null,"url":null,"abstract":"Tor onion services provide anonymous service to clients using the Tor browser without disclosing the real address of the server. But an adversary could use a circuit fingerprinting attack to classify circuit types and discover the network address of the onion service. Recently, Tor has used padding defenses to inject dummy cells to protect against circuit fingerprinting attacks. But we found that circuits still expose much information to the adversary. In this paper, we present a novel circuit fingerprinting attack, which divides the circuit into the circuit generated by the client and the circuit generated by the onion service. To get a more effective attack, we tried three state-of-the-art classification models called SVM, Random Forest and XG-Boost, respectively. As the best performance, we attain 99.99 % precision and 99.99% recall when using Random Forest and X G Boost classification models, respectively. And we also tried to classify circuit types using our features and the classification model mentioned above, which was first proposed by Kwon. The best performance was achieved with 99.99% precision and 99.99% recall when using the random forest classifier in circuit type classification. The experimental results show that we achieved highly accurate circuit fingerprinting attacks even when application-layer traffic is identical and some type of circuits using the defenses provided by Tor.","PeriodicalId":364062,"journal":{"name":"2022 IEEE/ACM 7th Symposium on Edge Computing (SEC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE/ACM 7th Symposium on Edge Computing (SEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SEC54971.2022.00076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Tor onion services provide anonymous service to clients using the Tor browser without disclosing the real address of the server. But an adversary could use a circuit fingerprinting attack to classify circuit types and discover the network address of the onion service. Recently, Tor has used padding defenses to inject dummy cells to protect against circuit fingerprinting attacks. But we found that circuits still expose much information to the adversary. In this paper, we present a novel circuit fingerprinting attack, which divides the circuit into the circuit generated by the client and the circuit generated by the onion service. To get a more effective attack, we tried three state-of-the-art classification models called SVM, Random Forest and XG-Boost, respectively. As the best performance, we attain 99.99 % precision and 99.99% recall when using Random Forest and X G Boost classification models, respectively. And we also tried to classify circuit types using our features and the classification model mentioned above, which was first proposed by Kwon. The best performance was achieved with 99.99% precision and 99.99% recall when using the random forest classifier in circuit type classification. The experimental results show that we achieved highly accurate circuit fingerprinting attacks even when application-layer traffic is identical and some type of circuits using the defenses provided by Tor.
Tor洋葱服务为使用Tor浏览器的客户端提供匿名服务,而不泄露服务器的真实地址。但是攻击者可以使用电路指纹攻击来对电路类型进行分类并发现洋葱服务的网络地址。最近,Tor使用填充防御注入假细胞来防止电路指纹攻击。但我们发现电路仍然会向对手暴露很多信息。本文提出了一种新的电路指纹攻击方法,将电路分为客户端生成的电路和洋葱服务生成的电路。为了获得更有效的攻击,我们分别尝试了三种最先进的分类模型,分别称为SVM、Random Forest和XG-Boost。当使用随机森林和X G Boost分类模型时,我们分别达到99.99%的准确率和99.99%的召回率。我们也尝试用我们的特征和上面提到的由Kwon首先提出的分类模型来对电路类型进行分类。使用随机森林分类器进行电路类型分类时,准确率达到99.99%,召回率达到99.99%。实验结果表明,即使在应用层流量相同且某些类型的电路使用Tor提供的防御时,我们也可以实现高精度的电路指纹攻击。