ebook img

Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network PDF

35 Pages·2010·0.48 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network

Introduction ProtocolDistribution ApplicationUsage MisbehavingClients Conclusions Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network Abdelberi Chaabane, Pere Manils, Mohamed Ali Kaafar INRIARhônes-Alpes,FRANCE [email protected] NSS, September 3rd, 2010 1/37 Introduction ProtocolDistribution ApplicationUsage MisbehavingClients Conclusions Outline 1 Introduction Tor BitTorrent 2 Protocol Distribution Deep Packet Inspection The Unknown Traffic 3 Application Usage HTTP Usage BitTorrent Usage 4 Misbehaving Clients 5 Conclusions 2/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Outline 1 Introduction Tor BitTorrent 2 Protocol Distribution Deep Packet Inspection The Unknown Traffic 3 Application Usage HTTP Usage BitTorrent Usage 4 Misbehaving Clients 5 Conclusions 3/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Tor What is Tor? A low-latency anonymizing network. Only TCP traffic. Volunteer-based infrastructure. 1.800 nodes. Main goal Prevent linking communication partners. 4/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Tor: Illustration (1) 5/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Tor: Illustration (2) 6/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Tor: Illustration (3) 7/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Our Experiments Took place at the exit node side. Deployed 6 exit nodes. Monitored them. 8/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions Outline 1 Introduction Tor BitTorrent 2 Protocol Distribution Deep Packet Inspection The Unknown Traffic 3 Application Usage HTTP Usage BitTorrent Usage 4 Misbehaving Clients 5 Conclusions 9/37 Introduction ProtocolDistribution Tor ApplicationUsage BitTorrent MisbehavingClients Conclusions BitTorrent The most used P2P network. Peers share files. Main entities Peers: share content between them (TCP). Trackers: help peers to know which other peers share a particular content (HTTP-TCP). 10/37

Description:
BitTorrent. 2. Protocol Distribution. Deep Packet Inspection. The Unknown Traffic. 3. Application Usage. HTTP Usage. BitTorrent Usage. 4. Misbehaving Clients.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.