watermark based attack on tor network n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
‘ Watermark Based Attack on Tor Network’ PowerPoint Presentation
Download Presentation
‘ Watermark Based Attack on Tor Network’

Loading in 2 Seconds...

play fullscreen
1 / 11

‘ Watermark Based Attack on Tor Network’ - PowerPoint PPT Presentation


  • 149 Views
  • Updated on

‘ Watermark Based Attack on Tor Network’. Utkarsh Agarwal Sujogya Banerjee Group Number:4. Motivation & Goals. Project Description. We implement a ‘watermark’ scheme proposed by Douglas S.Reeves, Peng Ning and X.Wang .

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

‘ Watermark Based Attack on Tor Network’


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. ‘Watermark Based Attack on Tor Network’ Utkarsh Agarwal Sujogya Banerjee Group Number:4

    2. Motivation & Goals

    3. Project Description • We implement a ‘watermark’ scheme proposed by Douglas S.Reeves, PengNing and X.Wang. • This technique claims to be robust against flow transformation and repacketization. • Evaluate the technique on ‘TOR’. • ‘TOR’ is supposed to be a very effective anonymous communication network.

    4. What is Tor? Tor is a circuit based low latency anonymous communication system. It is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Makes a user Incognito.

    5. HOW TOR WORKS ??

    6. The Content Switching Problem: • The stepping stones(intermediate hosts) repacketizethe packets and add flow transformations making them difficult to be co -related.

    7. Introducing the Watermark • The timing domain of the packet flow(inter packet delay) is manipulated to embed the watermark.

    8. Risks and Benefits • Novel aspects of this project: The TOR network has never been tested against the watermarking attack for traffic analysis. • Risks/challenges: Analysis of the packet flow at the receivers end. The watermark may get distorted during its transition through the network. Attackers have a lot of traffic to hide in. • Potential applications & benefits: • Traceability of anonymous attacks • Development of a software for watermarking.

    9. Tasks Accomplished by Now We have setup a Tor Client and a thttpd server. We analyzed the packet flow at the server end by sniffing and found out that different Tor nodes were used to access the server for the same client request. We have started the implementation of the watermarking algorithm.

    10. DELIVERABLES & MILESTONESTill 11/14/2007 • Implement the watermark and test it on the established Tor platform. • Analyze the results and check the watermarks integrity. • Co-relate the network flow to the attacker.

    11. THANK YOU!