Demo: Traffic Splitting for Tor – A Defense against Fingerprinting Attacks
DOI:
https://doi.org/10.14279/tuj.eceasst.80.1151Abstract
Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for Tor that incorporates multipath transmissions to repel malicious Tor nodes from conducting WFP attacks. In this demo, we showcase the operation of our traffic splitting defense by visually illustrating the underlying Tor multipath transmission using LED-equipped Raspberry Pis.Downloads
Published
2021-09-08
How to Cite
[1]
S. Reuter, J. Hiller, J. Pennekamp, A. Panchenko, and K. Wehrle, “Demo: Traffic Splitting for Tor – A Defense against Fingerprinting Attacks”, eceasst, vol. 80, Sep. 2021.
Issue
Section
Articles
License
Copyright (c) 2021 Electronic Communications of the EASST
This work is licensed under a Creative Commons Attribution 4.0 International License.