The use of anonymity networks such as Tor and similar tools can greatly enhance the privacy and anonymity of online communications. Tor, in particular, is currently the most widely used system for ensuring anonymity on the Internet. However, recent research has shown that Tor is vulnerable to correlation attacks carried out by state-level adversaries or colluding Internet censors. Therefore, new and more effective solutions emerged to protect online anonymity. Promising results have been achieved by implementing covert channels based on media traffic in modern anonymization systems, which have proven to be a reliable and practical approach to defend against powerful traffic correlation attacks. In this paper, we present TorKameleon, a censorship evasion solution that better protects Tor users from powerful traffic correlation attacks carried out by state-level adversaries. TorKameleon can be used either as a fully integrated Tor pluggable transport or as a standalone anonymization system that uses K-anonymization and encapsulation of user traffic in covert media channels. Our main goal is to protect users from machine and deep learning correlation attacks on anonymization networks like Tor. We have developed the TorKameleon prototype and performed extensive validations to verify the accuracy and experimental performance of the proposed solution in the Tor environment, including state-of-the-art active correlation attacks. As far as we know, we are the first to develop and study a system that uses both anonymization mechanisms described above against active correlation attacks.
翻译:匿名网络如 Tor 等工具的使用,可以大大增强在线通信的隐私性和匿名性。其中,Tor 目前是保障网络匿名性最广泛的系统。但是,最新的研究表明,Tor 存在着被国家级对手或串通的互联网审查机构进行关联攻击的风险。因此,新的更有效的解决方案涌现出来,以保护在线匿名性。基于媒体流量的隐蔽通道在现代匿名系统中已经证明是一种可靠且实用的方法,能够有效防御强大的流量相关攻击。本文提出了 TorKameleon,这是一种绕过互联网审查的解决方案,可更好地保护 Tor 用户免受国家级对手进行的强流量相关攻击的威胁。TorKameleon 可以作为一个完全集成的 Tor 插件传输系统,也可以作为独立的匿名化系统,使用 k-匿名技术和用户流量的媒体隐蔽信道进行封装。我们的主要目标是保护匿名化网络(如 Tor)用户免受机器学习和深度学习相关攻击的威胁。我们开发了 TorKameleon 原型,并进行了大量验证,以验证所提出的解决方案在 Tor 环境下的准确性和实验性能,其中包括最先进的主动相关攻击。据我们所知,我们是第一个开发和研究同时使用上述两种匿名机制防御主动相关攻击的系统。