Demo: Traffic Splitting for Tor – A Defense against Fingerprinting Attacks

Authors

  • Sebastian Reuter RWTH Aachen University
  • Jens Hiller RWTH Aachen University
  • Jan Pennekamp RWTH Aachen University
  • Andriy Panchenko Brandenburg University of Technology
  • Klaus Wehrle RWTH Aachen University

DOI:

https://doi.org/10.14279/tuj.eceasst.80.1151

Abstract

Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for Tor that incorporates multipath transmissions to repel malicious Tor nodes from conducting WFP attacks. In this demo, we showcase the operation of our traffic splitting defense by visually illustrating the underlying Tor multipath transmission using LED-equipped Raspberry Pis.

Downloads

Published

2021-09-08

How to Cite

[1]
S. Reuter, J. Hiller, J. Pennekamp, A. Panchenko, and K. Wehrle, “Demo: Traffic Splitting for Tor – A Defense against Fingerprinting Attacks”, eceasst, vol. 80, Sep. 2021.