Home // CLOUD COMPUTING 2024, The Fifteenth International Conference on Cloud Computing, GRIDs, and Virtualization // View article
Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis
Authors:
Pitpimon Choorod
Tobias J. Bauer
Andreas Aßmuth
Keywords: Anonymization; Tor; encryption
Abstract:
For journalists reporting from a totalitarian regime, whistleblowers and resistance fighters, the anonymous use of cloud services on the Internet can be vital for survival. The Tor network provides a free and widely used anonymization service for everyone. However, there are different approaches to distinguishing Tor from non-Tor encrypted network traffic, most recently only due to the (relative) frequencies of hex digits in a single encrypted payload packet. While conventional data traffic is usually encrypted once, but at least three times in the case of Tor due to the structure and principle of the Tor network, we have examined to what extent the number of encryptions contributes to being able to distinguish Tor from non-Tor encrypted data traffic.
Pages: 8 to 12
Copyright: Copyright (c) IARIA, 2024
Publication date: April 14, 2024
Published in: conference
ISSN: 2308-4294
ISBN: 978-1-68558-156-5
Location: Venice, Italy
Dates: from April 14, 2024 to April 18, 2024