|
StegoTorus: A Camouflage Proxy for the Tor Anonymity System
by Dr. Linda Briesemeister, Dr. Steven Cheung, Dr. Vinod Yegneswaran, Zachary Weinberg (Lead author, Carnegie Mellon University and SRI International), Jeffrey Wang (Stanford University), Frank Wang (Stanford University) & Dan Boneh (Stanford University).
19th ACM Conference on Computer and Communications Security (CCS).
Raleigh, North Carolina. October 16-18, 2012.
Abstract
Internet censorship by governments is an increasingly common practice
worldwide. Internet users and censors are locked in an arms race: as
users find ways to evade censorship schemes, the censors develop
countermeasures for the evasion tactics. One of the most popular and
effective circumvention tools, Tor, must regularly adjust its network
traffic signature to remain usable.
We present StegoTorus, a tool that comprehensively disguises Tor from
protocol analysis. To foil analysis of packet contents, Tor's traffic
is steganographed to resemble an innocuous cover protocol, such as
HTTP. To foil analysis at the transport level, the Tor circuit is
distributed over many shorter-lived connections with per-packet
characteristics that mimic cover-protocol traffic. Our evaluation
demonstrates that StegoTorus improves the resilience of Tor to
fingerprinting attacks and delivers usable performance.
BibTEX Entry
@inproceedings{Weinberg:CCS:2012,
author = {Zachary Weinberg and
Jeffrey Wang and
Vinod Yegneswaran and
Linda Briesemeister and
Steven Cheung and
Frank Wang and
Dan Boneh},
title = {{StegoTorus}: A Camouflage Proxy for the {Tor} Anonymity System},
booktitle = {Proceedings of the 19th ACM Conference on Computer and Communications Security},
pages = {109-120},
month = oct,
year = {2012}
}
Available from ACM. |
|