‘ Watermark Based Attack on Tor Network’. Utkarsh Agarwal Sujogya Banerjee Group Number:4. Motivation & Goals. Project Description. We implement a ‘watermark’ scheme proposed by Douglas S.Reeves, Peng Ning and X.Wang .
‘Watermark Based Attack on Tor Network’ Utkarsh Agarwal Sujogya Banerjee Group Number:4
Project Description • We implement a ‘watermark’ scheme proposed by Douglas S.Reeves, PengNing and X.Wang. • This technique claims to be robust against flow transformation and repacketization. • Evaluate the technique on ‘TOR’. • ‘TOR’ is supposed to be a very effective anonymous communication network.
What is Tor? Tor is a circuit based low latency anonymous communication system. It is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Makes a user Incognito.
The Content Switching Problem: • The stepping stones(intermediate hosts) repacketizethe packets and add flow transformations making them difficult to be co -related.
Introducing the Watermark • The timing domain of the packet flow(inter packet delay) is manipulated to embed the watermark.
Risks and Benefits • Novel aspects of this project: The TOR network has never been tested against the watermarking attack for traffic analysis. • Risks/challenges: Analysis of the packet flow at the receivers end. The watermark may get distorted during its transition through the network. Attackers have a lot of traffic to hide in. • Potential applications & benefits: • Traceability of anonymous attacks • Development of a software for watermarking.
Tasks Accomplished by Now We have setup a Tor Client and a thttpd server. We analyzed the packet flow at the server end by sniffing and found out that different Tor nodes were used to access the server for the same client request. We have started the implementation of the watermarking algorithm.
DELIVERABLES & MILESTONESTill 11/14/2007 • Implement the watermark and test it on the established Tor platform. • Analyze the results and check the watermarks integrity. • Co-relate the network flow to the attacker.