Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity network in use and provides anonymity to both users and services (hidden services). However, the anonymity provided by Tor is also being misused in various ways. Hosting illegal sites for selling drugs, hosting command and control servers for botnets, and distributing censored content are but a few such examples. As a result, various parties, including governments and law enforcement agencies, are interested in attacks that assist in de-anonymising the Tor network, disrupting its operations, and bypassing its censorship circumvention mechanisms. In this survey paper, we review known Tor attacks and identify current techniques for the de-anonymisation of Tor users and hidden services. We discuss these techniques and analyse the practicality of their execution method. We conclude by discussing improvements to the Tor framework that help prevent the surveyed de-anonymisation attacks.
翻译:匿名网络在今天的在线世界越来越受欢迎,因为越来越多的用户试图保护他们的在线隐私。Tor是目前使用中最受欢迎的匿名网络,为用户和服务(隐蔽服务)提供匿名。然而,Tor提供的匿名也以各种方式被滥用。主办非法销售毒品的网站,为肉网提供指挥和控制服务器,分发受禁内容,只是其中的几个例子。因此,包括政府和执法机构在内的各方都对袭击感兴趣,这些袭击有助于取消Tor网络的匿名,干扰其运作,绕过其审查机制。我们在本调查文件中审查已知的Tor袭击,并查明目前消除Tor用户匿名和隐藏服务的技术。我们讨论这些技术,分析其执行方法的实用性。我们最后讨论了有助于防止被调查的非匿名袭击的Tor框架的改进情况。