Home // CLOUD COMPUTING 2024, The Fifteenth International Conference on Cloud Computing, GRIDs, and Virtualization // View article


Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis

Authors:
Pitpimon Choorod
Tobias J. Bauer
Andreas Aßmuth

Keywords: Anonymization; Tor; encryption

Abstract:
For journalists reporting from a totalitarian regime, whistleblowers and resistance fighters, the anonymous use of cloud services on the Internet can be vital for survival. The Tor network provides a free and widely used anonymization service for everyone. However, there are different approaches to distinguishing Tor from non-Tor encrypted network traffic, most recently only due to the (relative) frequencies of hex digits in a single encrypted payload packet. While conventional data traffic is usually encrypted once, but at least three times in the case of Tor due to the structure and principle of the Tor network, we have examined to what extent the number of encryptions contributes to being able to distinguish Tor from non-Tor encrypted data traffic.

Pages: 8 to 12

Copyright: Copyright (c) IARIA, 2024

Publication date: April 14, 2024

Published in: conference

ISSN: 2308-4294

ISBN: 978-1-68558-156-5

Location: Venice, Italy

Dates: from April 14, 2024 to April 18, 2024