A First-Hop Traffic Analysis Attack Against Tor

Abstract

We introduce an attack against encrypted web traffic passing over the first hop – between client and Tor gateway – of the Tor network. The attack makes use only of packet timing information on the uplink and so is impervious to packet padding defences. In addition, we show that the attack is robust against the randomised routing used in Tor. We demonstrate the effectiveness of the attack at identifying the web sites being visited by a Tor user, achieving mean success rates of 68%. As well as being of interest in its own right, this timing-only attack serves to highlight deficiencies in existing defences and so to areas where it would be beneficial for Tor and VPN designers to focus further attention

    Similar works