Abstract
In August 2013, the Tor network experienced a sudden, drastic reduction in performance due to the Mevade/Sefnit botnet. This botnet ran its command and control server as a Tor hidden service, so that all infected nodes contacted the command and control through Tor. In this paper, we consider several protocol changes to protect Tor against future incidents of this nature, describing the research challenges that must be solved in order to evaluate and deploy each of these methods. In particular, we consider four technical approaches: resource-based throttling, guard node throttling, reuse of failed partial circuits, and hidden service circuit isolation.
Original language | English (US) |
---|---|
Title of host publication | Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers |
Editors | Reihaneh Safavi-Naini, Nicolas Christin |
Publisher | Springer Verlag |
Pages | 316-325 |
Number of pages | 10 |
ISBN (Electronic) | 9783662454718 |
DOIs | |
State | Published - 2014 |
Event | 18th International Conference on Financial Cryptography and Data Security, FC 2014 - Christ Church, Barbados Duration: Mar 3 2014 → Mar 7 2014 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 8437 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Other
Other | 18th International Conference on Financial Cryptography and Data Security, FC 2014 |
---|---|
Country/Territory | Barbados |
City | Christ Church |
Period | 3/3/14 → 3/7/14 |
Bibliographical note
Publisher Copyright:© International Financial Cryptography Association 2014.