IEICE Communications Express
Online ISSN : 2187-0136
ISSN-L : 2187-0136
Countermeasure against fingerprinting attack in Tor by separated contents retrieval
Naonobu OkazakiKentaroh ToyodaEmiri YokoyamaHirofumi SoTetsuro KatayamaMirang Park
Author information
JOURNAL FREE ACCESS

2015 Volume 4 Issue 12 Pages 370-375

Details
Abstract

Tor (The Onion Router) realizes that anonymous web surfing without revealing the user’s identity. However, A. Panachenko et al. reveals that an onion router that directly communicates with a user can infer which website a user accesses by leveraging site-specific traffic features, e.g., volume and time, and this attack is called the fingerprinting attack. In this paper, we propose a countermeasure against the fingerprinting attack by obfuscating site-specific traffic features. The idea is to establish two distinct Tor connections and to separately request text-based contents and image-based one through them. We show the effectiveness of our scheme with experiments.

Content from these authors
© 2015 The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top