Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Identifying and characterizing Sybils in the Tor network
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. Princeton University. (PriSec)
Princeton University.
The Tor Project.
Princeton University.
2016 (English)In: Proceedings of the 25th USENIX Security Symposium, USENIX - The Advanced Computing Systems Association, 2016, 1169-1185 p.Conference paper, Published paper (Refereed)
Abstract [en]

Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little is known about real-world Sybils in the Tor network, and we lack practical tools and methods to expose Sybil attacks. In this work, we develop sybilhunter, a system for detecting Sybil relays based on their appearance, such as configuration; and behavior, such as uptime sequences. We used sybilhunter’s diverse analysis techniques to analyze nine years of archived Tor network data, providing us with new insights into the operation of real-world attackers. Our findings include diverse Sybils, ranging from botnets, to academic research, and relays that hijacked Bitcoin transactions. Our work shows that existing Sybil defenses do not apply to Tor, it delivers insights into realworld attacks, and provides practical tools to uncover and characterize Sybils, making the network safer for its users.

Place, publisher, year, edition, pages
USENIX - The Advanced Computing Systems Association, 2016. 1169-1185 p.
Keyword [en]
tor, sybil attack, anonymity
National Category
Computer Systems
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-43678ISI: 000385263000069ISBN: 978-1-931971-32-4 (electronic)OAI: oai:DiVA.org:kau-43678DiVA: diva2:943421
Conference
25th USENIX Security Symposium, August 10–12, 2016, in Austin, Texas, USA
Available from: 2016-06-27 Created: 2016-06-27 Last updated: 2017-06-26Bibliographically approved

Open Access in DiVA

fulltext(1157 kB)56 downloads
File information
File name FULLTEXT02.pdfFile size 1157 kBChecksum SHA-512
24508881017b069f19201232f85ddfbed11ae60657f16caaae76025c8b3b01220db5f3b4d08f1f0c224d83fb402168274fc993326eb2ca2743be0ae448c6cac1
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Winter, Philipp
By organisation
Department of Mathematics and Computer Science
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 56 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 107 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf