1 / 11

‘ Watermark Based Attack on Tor Network’

‘ Watermark Based Attack on Tor Network’. Utkarsh Agarwal Sujogya Banerjee Group Number:4. Motivation & Goals. Project Description. We implement a ‘watermark’ scheme proposed by Douglas S.Reeves, Peng Ning and X.Wang .

salali
Download Presentation

‘ Watermark Based Attack on Tor Network’

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ‘Watermark Based Attack on Tor Network’ Utkarsh Agarwal Sujogya Banerjee Group Number:4

  2. Motivation & Goals

  3. Project Description • We implement a ‘watermark’ scheme proposed by Douglas S.Reeves, PengNing and X.Wang. • This technique claims to be robust against flow transformation and repacketization. • Evaluate the technique on ‘TOR’. • ‘TOR’ is supposed to be a very effective anonymous communication network.

  4. What is Tor? Tor is a circuit based low latency anonymous communication system. It is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Makes a user Incognito.

  5. HOW TOR WORKS ??

  6. The Content Switching Problem: • The stepping stones(intermediate hosts) repacketizethe packets and add flow transformations making them difficult to be co -related.

  7. Introducing the Watermark • The timing domain of the packet flow(inter packet delay) is manipulated to embed the watermark.

  8. Risks and Benefits • Novel aspects of this project: The TOR network has never been tested against the watermarking attack for traffic analysis. • Risks/challenges: Analysis of the packet flow at the receivers end. The watermark may get distorted during its transition through the network. Attackers have a lot of traffic to hide in. • Potential applications & benefits: • Traceability of anonymous attacks • Development of a software for watermarking.

  9. Tasks Accomplished by Now We have setup a Tor Client and a thttpd server. We analyzed the packet flow at the server end by sniffing and found out that different Tor nodes were used to access the server for the same client request. We have started the implementation of the watermarking algorithm.

  10. DELIVERABLES & MILESTONESTill 11/14/2007 • Implement the watermark and test it on the established Tor platform. • Analyze the results and check the watermarks integrity. • Co-relate the network flow to the attacker.

  11. THANK YOU!

More Related