De-Anonymization in Tor Network
Presented by:-
• A021-Naman Dalsania
• A030-Jinesh Jain
• A037-Loukik Khandare
Working of a Tor Network
Path choice in a Tor Network
Need for De-Anonymization in Tor Network
• De-Anonymization in Tor Network is needed to track down the real IP
addresses of the Hidden Services so , so that it can be taken down or
the owner of that server could be punished for malicious crimes
performed from that server. The need to de-anonymize these hidden
services is because they serve as a route to perform malicious
activities on the Tor Network like drug supply, child porn, weapon
deals, etc.
What are Hidden Services?
• Hidden services are the websites located inside the Tor Networks, which
receive inbound connection only through Tor.
• They provide server anonymity in addition to Tor-default client one.
• They protect the location of the server hosting the service and provide
encryption at every hop from a client to the hidden service.
Method of De-Anonymizing HS
• Active Attack:-
The adversary injects malicious nodes in the Tor network and
eventually obtain the control of the HS entry guard with the possibility
of disabling benign
General idea: Since only entry nodes of the server knows its location (IP
address) the attacker consists in trying several attempts of connections
to the HS until this chooses an entry guard controlled by the attacker
relays.
Attack Phases in Active Attack
• Phase 1: The client continues to establish new connections with HS
and recording every kind of cell in the central server.It repeats this
loop until one of its entry point sees the following combination of
cells.
Phase 2:
• In this phase the attacker want to be sure its relay is chosen as HS
entry guard.
• When the client is about to establish the conversation with the
server, it automatically sends a begin cell.
• The RP without even decrypting, it modifies 1 bit of the cell so that
the server will not understand its content. Note that it works because
the integrity check is performed ONLY at HS.
• The above triggers a destroy cell to be sent back to the client to tear
down the complete circuit.
• Every attacker’s relay is waiting for this cell and, if it arrives, reports it
to the central server
Phase 2:
Phase 3
• The central server check the following
o Both RP and entry node trigger a Destroy event
oTimeliness of them is consistent: given Tb the timing of the begin cell
and Te the timing of the destroy cell at RP and Td the timing of the
destroy cell at entry point. If ,
Tb < Td < Te
timing of event is consistent.
• This implies the attacker controls an HS entry guard so… he is directly
connected with the server and consequently it knows its location.
• So the de-anonymization is successful.
Thank You.

De anonymization in tor

  • 1.
    De-Anonymization in TorNetwork Presented by:- • A021-Naman Dalsania • A030-Jinesh Jain • A037-Loukik Khandare
  • 2.
    Working of aTor Network
  • 3.
    Path choice ina Tor Network
  • 4.
    Need for De-Anonymizationin Tor Network • De-Anonymization in Tor Network is needed to track down the real IP addresses of the Hidden Services so , so that it can be taken down or the owner of that server could be punished for malicious crimes performed from that server. The need to de-anonymize these hidden services is because they serve as a route to perform malicious activities on the Tor Network like drug supply, child porn, weapon deals, etc.
  • 5.
    What are HiddenServices? • Hidden services are the websites located inside the Tor Networks, which receive inbound connection only through Tor. • They provide server anonymity in addition to Tor-default client one. • They protect the location of the server hosting the service and provide encryption at every hop from a client to the hidden service.
  • 6.
    Method of De-AnonymizingHS • Active Attack:- The adversary injects malicious nodes in the Tor network and eventually obtain the control of the HS entry guard with the possibility of disabling benign General idea: Since only entry nodes of the server knows its location (IP address) the attacker consists in trying several attempts of connections to the HS until this chooses an entry guard controlled by the attacker relays.
  • 7.
    Attack Phases inActive Attack • Phase 1: The client continues to establish new connections with HS and recording every kind of cell in the central server.It repeats this loop until one of its entry point sees the following combination of cells.
  • 8.
    Phase 2: • Inthis phase the attacker want to be sure its relay is chosen as HS entry guard. • When the client is about to establish the conversation with the server, it automatically sends a begin cell. • The RP without even decrypting, it modifies 1 bit of the cell so that the server will not understand its content. Note that it works because the integrity check is performed ONLY at HS. • The above triggers a destroy cell to be sent back to the client to tear down the complete circuit. • Every attacker’s relay is waiting for this cell and, if it arrives, reports it to the central server
  • 9.
  • 10.
    Phase 3 • Thecentral server check the following o Both RP and entry node trigger a Destroy event oTimeliness of them is consistent: given Tb the timing of the begin cell and Te the timing of the destroy cell at RP and Td the timing of the destroy cell at entry point. If , Tb < Td < Te timing of event is consistent. • This implies the attacker controls an HS entry guard so… he is directly connected with the server and consequently it knows its location. • So the de-anonymization is successful.
  • 11.