Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
Next
Download to read offline and view in fullscreen.

Share

Anonymity in Dark Web

Download to read offline

These slides were presented at the Iran University of Science and Technology. It was for Network Security course in Winter 2019.

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

Anonymity in Dark Web

  1. 1. Anonymity in Dark Web Hita Barasm Mamagani Dec. 2019 – Network Security Course (by Dr Akbari) Iran University of Science and Technology
  2. 2. 29 Dec. 2019Anonymity in DarkWeb - Hita Barasm Mamagani 2
  3. 3. Why Anonymity?! Hide identity (not content) from service provider Hide browsing pattern from ISP (and else) Conceal Internet usage from hackers Circumvent censorship (Most in IRAN) 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 3
  4. 4. Anonymity Layer 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 4 Hide the Source, Destination and Content of Internet flows from eavesdroppers
  5. 5. Anonymity Projects Tor Project I2P (Invisible Internet Project) Freenet ZeroNet Tails (OS based on Tor connections) 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 5
  6. 6. Tor Project Conceal user’s identity and their online activity from surveillance and traffic analysis Done by passing the data through a circuit of at least three different routers (nodes) Data through the network is encrypted No encryption at beginning and 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 6
  7. 7. 29 Dec. 2019Anonymity in DarkWeb - Hita Barasm Mamagani 7
  8. 8. Hidden Services Server can offer TCP service without revealing its IP address Most popular hidden services: Silk Road: Online marketplace for legal and illegal assets (until 2017) DuckDuckGo: Search engine for hidden services Hidden Wiki: Encyclopedia of Tor hidden services WallStreet Market: Another marketplace like Silk Road (until 2019) 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 8
  9. 9. Hidden Service Address Address with 2 parts First part is a hash generated by Tor Second part is a domain type of Onion 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 9 http://facebookcorewwwi.onion Facebook hash as Tor domain address
  10. 10. How Tor Works? All data have fixed sizes Generate session keys between user and nodes via Asymmetric encryption Encrypt packet with AES encryption algorithm SHA-1 digest of data for integrity checking 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 10
  11. 11. Tor Architecture 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 11
  12. 12. Tor Architecture (Cont.) 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 12 Client Server Router A Router B Router C
  13. 13. Packet in Tor Network 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 13
  14. 14. Autonomous Eavesdropping An AS exists on both entry and exit node of request path Statistically correlate traffic on entry and exit segments Find out which users communicate with which servers 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 14
  15. 15. Exit Node Eavesdropping Tor does not encrypt the traffic between exit node and target server Exit nodes do not use any end-to- end encryption such as TLS and SSL Any eavesdropper can get main source of data after passing data from exit node 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 15
  16. 16. Sniper Attack Attacker creates his own exit node Has a colluding client and server Attacks to other exit nodes by filling their queue memory Data of other clients will get through attacker’s exit node 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 16
  17. 17. Exit Node Block Operators of Internet sites prevent traffic incoming from Tor exit nodes Web services like Wikipedia, BBC and iPlayer have such rules 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 17
  18. 18. Dangers of using Tor Entry and exit nodes are vulnerable to packet sniffing Exit node gets full plaintext of client’s request Any legal and illegal traffic will be directed to exit node IP address Any Tor user get into NSA watch list 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 18
  19. 19. 19
  20. 20. Any further Questions? Thanks for giving your time and patience. 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 20

These slides were presented at the Iran University of Science and Technology. It was for Network Security course in Winter 2019.

Views

Total views

36

On Slideshare

0

From embeds

0

Number of embeds

1

Actions

Downloads

0

Shares

0

Comments

0

Likes

0

×