Introduction ProtocolDistribution ApplicationUsage MisbehavingClients Conclusions Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network Abdelberi Chaabane, Pere Manils, Mohamed Ali Kaafar INRIARhônes-Alpes,FRANCE [email protected] NSS, September 3rd, 2010 1/37 Introduction ProtocolDistribution ApplicationUsage MisbehavingClients Conclusions Outline 1 Introduction Tor BitTorrent 2 Protocol Distribution Deep Packet Inspection The Unknown Traffic 3 Application Usage HTTP Usage BitTorrent Usage 4 Misbehaving Clients 5 Conclusions 2/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Outline 1 Introduction Tor BitTorrent 2 Protocol Distribution Deep Packet Inspection The Unknown Traffic 3 Application Usage HTTP Usage BitTorrent Usage 4 Misbehaving Clients 5 Conclusions 3/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Tor What is Tor? A low-latency anonymizing network. Only TCP traffic. Volunteer-based infrastructure. 1.800 nodes. Main goal Prevent linking communication partners. 4/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Tor: Illustration (1) 5/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Tor: Illustration (2) 6/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Tor: Illustration (3) 7/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Our Experiments Took place at the exit node side. Deployed 6 exit nodes. Monitored them. 8/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Outline 1 Introduction Tor BitTorrent 2 Protocol Distribution Deep Packet Inspection The Unknown Traffic 3 Application Usage HTTP Usage BitTorrent Usage 4 Misbehaving Clients 5 Conclusions 9/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions BitTorrent The most used P2P network. Peers share files. Main entities Peers: share content between them (TCP). Trackers: help peers to know which other peers share a particular content (HTTP-TCP). 10/37
Description: