Online anonymity and privacy has been based on confusing the adversary by creating indistinguishable network elements. Tor is the largest and most-used deployed anonymity system, designed against realistic modern adversaries. Recently, researchers have managed to fingerprint Tor's circuits - and hence the type of underlying traffic - simply by capturing and analyzing traffic traces. In this work, we study the circuit fingerprinting problem, isolating it from website fingerprinting, and revisit previous findings in this model, showing that accurate attacks are possible even when the application-layer traffic is identical. We then proceed to incrementally create defenses against circuit fingerprinting, using a generic adaptive padding framework for Tor based on WTF-PAD. We present a simple but high-latency defense, as well as a more advanced low-latency one which can effectively hide onion service circuits with no additional delays. We thoroughly evaluate both defenses, both analytically and experimentally, discovering new subtle fingerprints, but also showing the effectiveness of our defenses.
翻译:在线匿名和隐私基于通过创建无法区分的网络元素将对手混为一谈。 Tor 是针对现实现代对手设计的最大和最常用的部署匿名系统。 最近,研究人员通过捕捉和分析交通痕迹,简单地对Tor的电路进行了指纹鉴定,从而确定了交通的特征。 在这项工作中,我们研究了电路指纹问题,将其与网站指纹区分开来,并重新审视了这一模型的先前发现,表明即使在应用层交通相同的情况下,准确的攻击也是可能的。 然后我们开始逐步建立针对电路指纹的防线,使用基于 WTF-PAD 的通用适应性定位框架。 我们展示了简单但高超长的防线,以及更先进的低长防线,可以有效隐藏电流服务线路,而不会再拖延。 我们从分析角度和实验角度彻底评估了两种防御,发现了新的微妙指纹,但也展示了我们防御的有效性。