Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network

Eric Filiol, Nicolas J., Maxence Delong

2018

Abstract

In this paper, we present the results of a deep analysis of TOR routing protocol from a statistical and combinatorial point of view. We have modeled all possible routes of this famous anonymity network exhaustively while taking different parameters into account with the data provided by the TOR foundation only. We have then confronted our theoretical model with the reality on the ground. To do this, we have generated thousands of roads on the TOR network and compared the results obtained with those predicted by the theory. A last step of combinatorial analysis has enabled us to identify critical subsets of Onion routers (ORs) which 33 %, 50 %, 66 % and 75 % of the TOR trafic respectively depends on. We have also managed to extract most of the TOR relay bridges which are non public nodes managed by the TOR foundation. The same results as for the ORs have been observed.

Download


Paper Citation


in Harvard Style

Filiol E., J. N. and Delong M. (2018). Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network.In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ForSE, ISBN 978-989-758-282-0, pages 507-516. DOI: 10.5220/0006634705070516


in Bibtex Style

@conference{forse18,
author={Eric Filiol and Nicolas J. and Maxence Delong},
title={Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network},
booktitle={Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ForSE,},
year={2018},
pages={507-516},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006634705070516},
isbn={978-989-758-282-0},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ForSE,
TI - Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network
SN - 978-989-758-282-0
AU - Filiol E.
AU - J. N.
AU - Delong M.
PY - 2018
SP - 507
EP - 516
DO - 10.5220/0006634705070516